Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Invasive browser sniffing and countermeasures
Proceedings of the 15th international conference on World Wide Web
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Modeling and preventing phishing attacks
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Don't be a phish: steps in user education
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Behavioral response to phishing risk
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks
IEEE Security and Privacy
Itrustpage: a user-assisted anti-phishing tool
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Privacy-enhanced sharing of personal content on the web
Proceedings of the 17th international conference on World Wide Web
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
A user study design for comparing the security of registration protocols
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Antisocial Networks: Turning a Social Network into a Botnet
ISC '08 Proceedings of the 11th international conference on Information Security
Using Cartoons to Teach Internet Security
Cryptologia
Social networks and context-aware spam
Proceedings of the 2008 ACM conference on Computer supported cooperative work
On the need for user-defined fine-grained access control policies for social networking applications
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Threat Modelling in User Performed Authentication
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Trust modelling for online transactions: a phishing scenario
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Proceedings of the 40th ACM technical symposium on Computer science education
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Fraudulent and malicious sites on the web
Applied Intelligence
How much do you tell?: information disclosure behaviour indifferent types of online communities
Proceedings of the fourth international conference on Communities and technologies
School of phish: a real-world evaluation of anti-phishing training
Proceedings of the 5th Symposium on Usable Privacy and Security
Eight friends are enough: social graph approximation via public listings
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
The SocialTrust framework for trusted social information management: Architecture and algorithms
Information Sciences: an International Journal
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Personality traits, usage patterns and information disclosure in online communities
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
A Secure Mobile-Based Authentication System for e-Banking
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
BBN-based privacy management sytem for facebook
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Sh@re: negotiated audit in social networks
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT)
Teaching Johnny not to fall for phish
ACM Transactions on Internet Technology (TOIT)
Malicious interface design: exploiting the user
Proceedings of the 19th international conference on World wide web
Prevention of cross-site scripting attacks on current web applications
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
PAPA knows best: Principles for the ethical sharing of information on social networking sites
Ethics and Information Technology
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
Why spammers should thank Google?
Proceedings of the 3rd Workshop on Social Network Systems
Exploiting social networking sites for spam
Proceedings of the 17th ACM conference on Computer and communications security
Cheap and automated socio-technical attacks based on social networking sites
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Empirical analysis of internet identity misuse: case study of south Korean real name system
Proceedings of the 6th ACM workshop on Digital identity management
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Web browser history detection as a real-world privacy threat
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Keep your name off the list: securing administrative departments from the dangers of social malware
Proceedings of the 48th Annual Southeast Regional Conference
Detecting spammers on social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Identifying and resolving hidden text salting
IEEE Transactions on Information Forensics and Security
Understanding the behavior of malicious applications in social networks
IEEE Network: The Magazine of Global Internetworking
Assessing the severity of phishing attacks: A hybrid data mining approach
Decision Support Systems
The dark side of the Internet: Attacks, costs and responses
Information Systems
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Does domain highlighting help people identify phishing sites?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Enhancing scalability in anomaly-based email spam filtering
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Phi.sh/$oCiaL: the phishing landscape through short URLs
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Spam detection on twitter using traditional classifiers
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering
Expert Systems with Applications: An International Journal
Taxonomy of cyber attacks and simulation of their effects
Proceedings of the 2011 Military Modeling & Simulation Symposium
Communications of the ACM
Journal of Management Information Systems
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Social snapshots: digital forensics for online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the Seventh Symposium on Usable Privacy and Security
Poster: preliminary analysis of Google+'s privacy
Proceedings of the 18th ACM conference on Computer and communications security
The personality of popular facebook users
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
A survey on detection techniques to prevent cross-site scripting attacks on current web applications
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Detecting collective attention spam
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
C4PS: colors for privacy settings
Proceedings of the 21st international conference companion on World Wide Web
Expert Systems with Applications: An International Journal
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Security and Communication Networks
Word sense disambiguation for spam filtering
Electronic Commerce Research and Applications
PoX: Protecting users from malicious Facebook applications
Computer Communications
A vulnerability evaluation framework for online social network profiles: axioms and propositions
International Journal of Internet Technology and Secured Transactions
Poultry markets: on the underground economy of twitter followers
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Efficient and scalable socware detection in online social networks
Security'12 Proceedings of the 21st USENIX conference on Security symposium
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Learning from early attempts to measure information security performance
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
PeerSec: towards peer production and crowdsourcing for enhanced security
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Poultry markets: on the underground economy of twitter followers
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Examining network externalities and network structure for new product introduction
Information Technology and Management
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Spamming for science: active measurement in web 2.0 abuse research
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Comparative eye tracking of experts and novices in web single sign-on
Proceedings of the third ACM conference on Data and application security and privacy
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
A game design framework for avoiding phishing attacks
Computers in Human Behavior
Disclosure Intention of Location-Related Information in Location-Based Social Network Services
International Journal of Electronic Commerce
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Electronic word of mouth and knowledge sharing on social network sites: a social capital perspective
Journal of Theoretical and Applied Electronic Commerce Research
Follow the green: growth and dynamics in twitter follower markets
Proceedings of the 2013 conference on Internet measurement conference
Appinspect: large-scale evaluation of social networking apps
Proceedings of the first ACM conference on Online social networks
Reversing the effects of tokenisation attacks against content-based spam filters
International Journal of Security and Networks
Social engineering attacks on the knowledge worker
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 48.24 |
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.