Sciweavers

9 search results - page 2 / 2
» ecrime 2007
Sort
View
ECRIME
2007
13 years 9 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm
ECRIME
2007
13 years 9 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...
ISPEC
2007
Springer
13 years 11 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
CCS
2007
ACM
13 years 11 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...