Sciweavers

524 search results - page 2 / 105
» Why phishing works
Sort
View
AIMS
2009
Springer
13 years 11 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
GROUP
2010
ACM
13 years 3 months ago
Why it works (when it works): success factors in online creative collaboration
Online creative collaboration (peer production) has enabled the creation of Wikipedia and open source software (OSS), and is rapidly expanding to encompass new domains, such as vi...
Kurt Luther, Kelly E. Caine, Kevin Ziegler, Amy Br...
IEEECIT
2010
IEEE
13 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 8 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig