Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Communications of the ACM
Examining the impact of website take-down on phishing
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Fighting unicode-obfuscated spam
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Beamauth: two-factor web authentication with a bookmark
Proceedings of the 14th ACM conference on Computer and communications security
ACM SIGACT News
RepuScore: collaborative reputation management framework for email infrastructure
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
Decision Support Systems
Using Cartoons to Teach Internet Security
Cryptologia
There is no free phish: an analysis of "free" and live phishing kits
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
Ethics and the Practice of Software Design
Proceedings of the 2008 conference on Current Issues in Computing and Philosophy
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT)
Teaching Johnny not to fall for phish
ACM Transactions on Internet Technology (TOIT)
Phishing IQ tests measure fear, not ability
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Multi-factor authenticated key exchange
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Keep your name off the list: securing administrative departments from the dangers of social malware
Proceedings of the 48th Annual Southeast Regional Conference
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
SUT: Quantifying and mitigating URL typosquatting
Computer Networks: The International Journal of Computer and Telecommunications Networking
Communications of the ACM
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
The phish-market protocol: securely sharing attack data between competitors
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
hPIN/hTAN: a lightweight and low-cost e-banking solution against untrusted computers
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Expert Systems with Applications: An International Journal
Analyzing Internet e-mail date-spoofing
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Contextual OTP: mitigating emerging man-in-the-middle attacks with wireless hardware tokens
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
A measurement study of insecure javascript practices on the web
ACM Transactions on the Web (TWEB)
A pilot study of cyber security and privacy related behavior and personality traits
Proceedings of the 22nd international conference on World Wide Web companion
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users
International Journal of Information Security and Privacy
Hi-index | 0.03 |