共 20 条
[1]
Phighting the Phisher-using Web bugs and honeytokens to investigate the source ofPhishing attacks. MCRAE C M,VAUGHN R B. Proceedings of the40th Hawaii International Conference on System Sciences . 2007
[2]
Protection against web-based password Phishing. TAN C Hw,TEO J C M. International Conference on Information Technology .
[3]
Usability evaluation of anti-Phishing toolbars. LI Lin-feng,MARKO H. . 2007
[4]
A novel mail filtering method against Phishing. INOMATA A. IEEE Pacific Rim Conference on Communications,Computers and Signal Processing . 2005
[5]
Convenient password management and Phishing protection. YEE Ka-ping,SITAKER K. Symposium on Usable Privacy and Security . 2006
[6]
Network security
[J].
2005, Inst. of Image Information and Television Engineers, Tokyo, Japan (59)
[7]
Phishing in the system of systems settings:mobile technology.. VAN DER MERWE A,SEKER R. IEEE International Conference on Systems,Man and Cybemetics . 2005
[8]
Phoolproof Phishing prevention. PARNO B,KUO C. IFCA . 2006
[9]
International Federation for Information Processing[C]. Computer and Computing Technologies in Agriculture II——the Second IFIP International Conference(CCTA2008) Part II,2009
[10]
Phishing:Can we spot the signs. FURNELL S. Computer Fraud&Security . 2007