Search Results - "2009 eCrime Researchers Summit"
-
1
Phishing detection using classifier ensembles
Published in 2009 eCrime Researchers Summit (01-10-2009)“…This paper introduces an approach to classifying emails into phishing/non-phishing categories using the C5.0 algorithm which achieves very high precision and…”
Get full text
Conference Proceeding -
2
A novel anti-phishing framework based on honeypots
Published in 2009 eCrime Researchers Summit (01-10-2009)“…As a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new…”
Get full text
Conference Proceeding -
3
Improving phishing countermeasures: An analysis of expert interviews
Published in 2009 eCrime Researchers Summit (01-10-2009)“…In this paper, we present data from 31 semi-structured interviews with anti-phishing experts from academia, law enforcement, and industry. Our analysis led to…”
Get full text
Conference Proceeding -
4
Identifying vulnerable websites by analysis of common strings in phishing URLs
Published in 2009 eCrime Researchers Summit (01-10-2009)“…It has been shown that most phishing sites are created by means of a vulnerable Web server being re-purposed by a phisher to host a counterfeit Website without…”
Get full text
Conference Proceeding -
5
Determining provenance in phishing websites using automated conceptual analysis
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Phishing is a form of online fraud with drastic consequences for the victims and institutions being defrauded. A phishing attack tries to create a believable…”
Get full text
Conference Proceeding -
6
Discovery, infiltration, and denial of service in a process control system wireless network
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Process control systems and Supervisory Control and Data Acquisition (SCADA) systems use computers to control physical processes in many critical industries…”
Get full text
Conference Proceeding -
7
Establishing phishing provenance using orthographic features
Published in 2009 eCrime Researchers Summit (01-10-2009)“…After phishing message detection, determining the provenance of phishing messages and Websites is the second step to tracing cybercriminals. In this paper, we…”
Get full text
Conference Proceeding -
8
Humboldt: A distributed phishing disruption system
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Conventional techniques for combating phishing have focused primarily on detecting phishing web sites and preventing users from revealing their passwords to…”
Get full text
Conference Proceeding -
9
Why do users trust the wrong messages? A behavioural model of phishing
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Given the rise of phishing over the past 5 years, a recurring question is why users continue to fall for these scams? Various technical countermeasures have…”
Get full text
Conference Proceeding -
10
An exploration of unintended online private information disclosure in educational institutions across four countries
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Advanced Google search queries can be used to extract sensitive information from Websites that can potentially be exploited for malice. The purpose of this…”
Get full text
Conference Proceeding -
11
Burn Before Reading: A stealthy framework for combating live forensics examinations
Published in 2009 eCrime Researchers Summit (01-10-2009)“…Malicious Software/programs (malware) have grown to be quite sophisticated in their design causing significant levels of damage and for prolonged periods of…”
Get full text
Conference Proceeding