Sciweavers

24 search results - page 5 / 5
» scam 2007
Sort
View
ECRIME
2007
13 years 8 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
SCAM
2007
IEEE
13 years 11 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan
SCAM
2007
IEEE
13 years 11 months ago
Improved Static Resolution of Dynamic Class Loading in Java
Modern applications are becoming increasingly more dynamic and flexible. In Java software, one important flexibility mechanism is dynamic class loading. Unfortunately, the vast ...
Jason Sawin, Atanas Rountev
ACSAC
2007
IEEE
13 years 11 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...