Sciweavers

90 search results - page 2 / 18
» The Novel Features for Phishing Based on User Device Detecti...
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 2 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
TMC
2012
11 years 8 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
EUROSYS
2008
ACM
14 years 2 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
ICMCS
2007
IEEE
132views Multimedia» more  ICMCS 2007»
14 years 2 days ago
A New Multimedia Message Customizing Framework for mobile Devices
In this paper, we present a novel framework to customize multimedia messages for mobile users. The goal is to generate a video message from a series of pictures. The framework inc...
Cunxun Zang, Qingshan Liu, Hanqing Lu, Kongqiao Wa...
DIM
2008
ACM
13 years 6 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le