A comprehensive review and synthesis of open source research

A Aksulu, MR Wade - Journal of the Association for Information …, 2010 - aisel.aisnet.org
The open source movement has grown steadily and matured in recent years, and this
growth has been mirrored by a rise in open source related research. The objective of this …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Security awareness of computer users: A phishing threat avoidance perspective

NAG Arachchilage, S Love - Computers in human behavior, 2014 - Elsevier
Phishing is an online identity theft, which aims to steal confidential information such as
username, password and online banking details from its victims. To prevent this, anti …

Cantina: a content-based approach to detecting phishing web sites

Y Zhang, JI Hong, LF Cranor - … of the 16th international conference on …, 2007 - dl.acm.org
Phishing is a significant problem involving fraudulent email and web sites that trick
unsuspecting users into revealing private information. In this paper, we present the design …

Phishing threat avoidance behaviour: An empirical investigation

NAG Arachchilage, S Love, K Beznosov - Computers in Human Behavior, 2016 - Elsevier
Phishing is an online identity theft that aims to steal sensitive information such as username,
password and online banking details from its victims. Phishing education needs to be …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

You've been warned: an empirical study of the effectiveness of web browser phishing warnings

S Egelman, LF Cranor, J Hong - … of the SIGCHI conference on human …, 2008 - dl.acm.org
Many popular web browsers are now including active phishing warnings after previous
research has shown that passive warnings are often ignored. In this laboratory study we …

Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish

S Sheng, B Magnien, P Kumaraguru… - Proceedings of the 3rd …, 2007 - dl.acm.org
In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game
that teaches users good habits to help them avoid phishing attacks. We used learning …

[PDF][PDF] An empirical analysis of phishing blacklists

S Sheng, B Wardman, G Warner, L Cranor, J Hong… - 2009 - kilthub.cmu.edu
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that
were less than 30 minutes old to conduct two tests on eight anti-phishing toolbars. We found …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …