Sciweavers

524 search results - page 3 / 105
» Why phishing works
Sort
View
SOUPS
2006
ACM
13 years 11 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
WWW
2007
ACM
14 years 6 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
CEAS
2008
Springer
13 years 7 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
WWW
2006
ACM
14 years 6 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
WSC
2007
13 years 7 months ago
Inside discrete-event simulation software: how IT works and why IT matters
This paper provides simulation practitioners and consumers with a grounding in how discrete-event simulation software works. Topics include discreteevent systems; entities, resour...
Thomas J. Schriber, Daniel T. Brunner