Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Trust Negotiations with Customizable Anonymity
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
An e-mail signature protocol for anti-spam work-in-progress
Proceedings of the 2nd international conference on Scalable information systems
Behind phishing: an examination of phisher modi operandi
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
Journal of Management Information Systems
Phoolproof phishing prevention
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
New research suggests that phishing attacks, although increasing rapidly, arenýt proliferating on a wildfire basis. Instead, they might actually be controlled by a small number of criminal organizations, and dollar losses once estimated at over US$1 billion might be just above one tenth of that. However, the psychological toll phishing scams place on both service providers and end users can still cripple e-commerce.