Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques - Phishing
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques - Phishing
出处
《通讯和计算机(中英文版)》
2011年第7期545-549,共5页
Journal of Communication and Computer
参考文献15
-
1Anti-Pbishing Group of the City University of Hong Kong, available online at: http://antiphishing.cs.cityu.edu.hk, 2005.
-
2Anti-Phishing Working Group, available online at: http://www.antiphishing.org, 2005.
-
3R. Dhamija, J.D. Tygar, M. Hearst, Why phishing works, in: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2006), 2006, pp. 581-590.
-
4M. Wu, R.C. Miller, G. Little, Web wallet: preventing phishing attacks by revealing user intentions, in: Proceedings of The Second Symposium on Usable Privacy and Security (SOUPS 2006), 2006, pp. 102-113.
-
5E. Kirda, C. Kruegel, Protecting users against phishing attacks, The Computer Journal (2006).
-
6Yahoo. Yahoo! AntiSpam Resource Center, available online at: http://antispam.yahoo.com/domainkeys, 2007.
-
7NetCraft. Netcraft Anti-Phishing Tool Bar,http://toolbar.netcraft.com, 2007.
-
8F. Li, W. Wang, J. Ma, H. Su, Action-based access control for web services, in: Proceedings of the 2009 5th International Conference on Information Assurance and Security, 2009, pp 637-642.
-
9P. Robichaux, Gone Phishing: Evaluating Anti-Phishing Tools for Windows, available online at: http://www.3 sharp.com/projects/antiphishing/gone-phishi ng.pdf, 2006.
-
10Y. Zhang, S. Egelman, L.e Cranor, J. Hong, Phinding phish: evaluating anti-phishing tools, in." Network and IT Security Conference: NDSS 2007, San Diego, California, 2007.
-
1贺辛亥,白芳妮,金邦庆.网络信息传播中常见的犯罪形式及安全措施[J].西北纺织工学院学报,1999,13(3):322-325.
-
2Maneela.CYBER CRIMES: THE INDIAN LEGAL SCENARIO[J].US-China Law Review,2014,11(5):570-586.
-
3张艳华,郑洁.计算机取证技术的现状分析及发展趋势探讨[J].硅谷,2014,7(7):139-139. 被引量:2
-
4涂捷.计算机网络安全与防范的探讨[J].中国高教论丛,2004,26(3):111-114.
-
5金亮.科学规划 建立行之有效的安全体系[J].数字石油和化工,2006(5):22-24.
-
6欺骗邮件横行校园网[J].中国教育网络,2009(3):54-54.
-
7新闻集萃[J].网络安全技术与应用,2011(1):80-80.
-
8谢烨,谢蓓.计算机犯罪技术防范对策研究[J].中国电子商务,2012(6):93-94.
-
9网络犯罪目的突变 可被载入编年史[J].计算机与网络,2011,37(17):1-1.
-
10黄三犇.社会工程学:人肉搜索的操作指南[J].新知客,2010,0(7):40-41.