期刊文献+

Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques - Phishing

Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques - Phishing
下载PDF
导出
作者 Wajeb Gharibi
出处 《通讯和计算机(中英文版)》 2011年第7期545-549,共5页 Journal of Communication and Computer
关键词 网络钓鱼 网络犯罪 社会工程 保护技术 工程技术 犯罪形式 欺骗技术 机密数据 Information technology, information security, cybercrime, social engineering, phishing
  • 相关文献

参考文献15

  • 1Anti-Pbishing Group of the City University of Hong Kong, available online at: http://antiphishing.cs.cityu.edu.hk, 2005.
  • 2Anti-Phishing Working Group, available online at: http://www.antiphishing.org, 2005.
  • 3R. Dhamija, J.D. Tygar, M. Hearst, Why phishing works, in: Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2006), 2006, pp. 581-590.
  • 4M. Wu, R.C. Miller, G. Little, Web wallet: preventing phishing attacks by revealing user intentions, in: Proceedings of The Second Symposium on Usable Privacy and Security (SOUPS 2006), 2006, pp. 102-113.
  • 5E. Kirda, C. Kruegel, Protecting users against phishing attacks, The Computer Journal (2006).
  • 6Yahoo. Yahoo! AntiSpam Resource Center, available online at: http://antispam.yahoo.com/domainkeys, 2007.
  • 7NetCraft. Netcraft Anti-Phishing Tool Bar,http://toolbar.netcraft.com, 2007.
  • 8F. Li, W. Wang, J. Ma, H. Su, Action-based access control for web services, in: Proceedings of the 2009 5th International Conference on Information Assurance and Security, 2009, pp 637-642.
  • 9P. Robichaux, Gone Phishing: Evaluating Anti-Phishing Tools for Windows, available online at: http://www.3 sharp.com/projects/antiphishing/gone-phishi ng.pdf, 2006.
  • 10Y. Zhang, S. Egelman, L.e Cranor, J. Hong, Phinding phish: evaluating anti-phishing tools, in." Network and IT Security Conference: NDSS 2007, San Diego, California, 2007.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部