Stop the war!
Остановите войну!
for scientists:
default search action
eCrime 2009: Tacoma, WA, USA
- 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009. IEEE 2009, ISBN 978-1-4244-4625-4
- Paul Knickerbocker, Dongting Yu, Jun Li:
Humboldt: A distributed phishing disruption system. 1-12 - Fergus Toolan, Joe Carthy:
Phishing detection using classifier ensembles. 1-9 - Mina Guirguis, Jason Valdez, Bassam El Lababedi, Joseph Valdez:
Burn Before Reading: A stealthy framework for combating live forensics examinations. 1-10 - Robert Layton, Paul A. Watters:
Determining provenance in phishing websites using automated conceptual analysis. 1-7 - Liping Ma, John Yearwood, Paul A. Watters:
Establishing phishing provenance using orthographic features. 1-10 - Onook Oh, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya:
An exploration of unintended online private information disclosure in educational institutions across four countries. 1-11 - Bradley Reaves, Thomas H. Morris:
Discovery, infiltration, and denial of service in a process control system wireless network. 1-9 - Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong:
Improving phishing countermeasures: An analysis of expert interviews. 1-15 - Shujun Li, Roland Schmitz:
A novel anti-phishing framework based on honeypots. 1-13 - Brad Wardman, Gaurang Shukla, Gary Warner:
Identifying vulnerable websites by analysis of common strings in phishing URLs. 1-13 - Paul A. Watters:
Why do users trust the wrong messages? A behavioural model of phishing. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.