Online Deterence of Phishing Attacks
Abstract
Keywords
Full Text:
PDFReferences
I. Androutsopoulos,J. Koutsias,K.V. Chandrinos,andC.D.Spyropou- los. AnExperimentalComparisonof NaiveBayesianandKeyword- BasedAnti-Spam FilteringwithEncryptedPersonalE-mailMessage. InProc.SIGIR2000,2000.
TheAnti-phishing working group.http://www.antiphishing.org/.
Neil Chou, Robert Ledesma, Yuka Teraguchi,Dan Boneh, andJohn C. Mitchell. Client-side defense againstweb-based identity theft.In Proc. NDSS 2004, 2004.
CynthiaDwork,AndrewGoldberg, andMoniNaor.OnMemory-Bound FunctionsforFightingSpam.In Proc. Crypto 2003.
EarthLink.ScamBlocker.http://www.earthlink.net/software/free/toolbar/.
David Geer. Security Technologies Go Phishing. IEEE Computer,38(6):18–21, 2005.
John Leyden. Trusted search software labels fraud siteas ’safe’. http://www.theregister.co.uk/2005/09/27/untrusted search/.
Microsoft. Sender ID Framework. http://www.microsoft.com/ mscorp/safety/technologies/senderid/default.mspx.
Netcraft.Netcraft toolbar.http://toolbar.netcraft.com/.
PhishGuard.com. Protect Against Internet Phishing Scams . http://www.phishguard.com/.
Jonathan B. Postel. Simple Mail Transfer Protocol. RFC821: http://www.ietf.org/rfc/rfc0821.txt.
DOI: http://dx.doi.org/10.36039/AA082013005
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.