Search Results - "2009 eCrime Researchers Summit"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Phishing detection using classifier ensembles by Toolan, F., Carthy, J.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…This paper introduces an approach to classifying emails into phishing/non-phishing categories using the C5.0 algorithm which achieves very high precision and…”
    Get full text
    Conference Proceeding
  2. 2

    A novel anti-phishing framework based on honeypots by Shujun Li, Schmitz, R.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…As a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new…”
    Get full text
    Conference Proceeding
  3. 3

    Improving phishing countermeasures: An analysis of expert interviews by Sheng, S., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…In this paper, we present data from 31 semi-structured interviews with anti-phishing experts from academia, law enforcement, and industry. Our analysis led to…”
    Get full text
    Conference Proceeding
  4. 4

    Identifying vulnerable websites by analysis of common strings in phishing URLs by Wardman, B., Shukla, G., Warner, G.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…It has been shown that most phishing sites are created by means of a vulnerable Web server being re-purposed by a phisher to host a counterfeit Website without…”
    Get full text
    Conference Proceeding
  5. 5

    Determining provenance in phishing websites using automated conceptual analysis by Layton, R., Watters, P.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Phishing is a form of online fraud with drastic consequences for the victims and institutions being defrauded. A phishing attack tries to create a believable…”
    Get full text
    Conference Proceeding
  6. 6

    Discovery, infiltration, and denial of service in a process control system wireless network by Reaves, B., Morris, T.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Process control systems and Supervisory Control and Data Acquisition (SCADA) systems use computers to control physical processes in many critical industries…”
    Get full text
    Conference Proceeding
  7. 7

    Establishing phishing provenance using orthographic features by Liping Ma, Yearwood, John, Watters, Paul

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…After phishing message detection, determining the provenance of phishing messages and Websites is the second step to tracing cybercriminals. In this paper, we…”
    Get full text
    Conference Proceeding
  8. 8

    Humboldt: A distributed phishing disruption system by Knickerbocker, P., Dongting Yu, Jun Li

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Conventional techniques for combating phishing have focused primarily on detecting phishing web sites and preventing users from revealing their passwords to…”
    Get full text
    Conference Proceeding
  9. 9

    Why do users trust the wrong messages? A behavioural model of phishing by Watters, P.A.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Given the rise of phishing over the past 5 years, a recurring question is why users continue to fall for these scams? Various technical countermeasures have…”
    Get full text
    Conference Proceeding
  10. 10

    An exploration of unintended online private information disclosure in educational institutions across four countries by Onook Oh, Chakraborty, R., Rao, H.R., Upadhyaya, S.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Advanced Google search queries can be used to extract sensitive information from Websites that can potentially be exploited for malice. The purpose of this…”
    Get full text
    Conference Proceeding
  11. 11

    Burn Before Reading: A stealthy framework for combating live forensics examinations by Guirguis, M., Valdez, J., El Lababedi, B.

    Published in 2009 eCrime Researchers Summit (01-10-2009)
    “…Malicious Software/programs (malware) have grown to be quite sophisticated in their design causing significant levels of damage and for prolonged periods of…”
    Get full text
    Conference Proceeding