151 | -- | 152 | Judie Mulholland. Message from the Guest Editor |
157 | -- | 164 | Erin Kenneally. Enabling the Enablers: An Identity Fraud Solution for Law Enforcement |
165 | -- | 177 | Robert Lyda, James Hamrock. Exploring Investigative Methods for Identifying and Profiling Serial Bots |
179 | -- | 192 | Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel. Warkitting: The Drive-by Subversion of Wireless Home Routers |
193 | -- | 199 | Craig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn. Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams |
203 | -- | 222 | Bob Breeden, Mike Cantey, Brett Cureton, Clifford Stokes, Peter Henry, Judie Mulholland, Wayne Sprague, Jim Watson. The Phlorida Autopsy Report |
223 | -- | 229 | J. Philip Craiger, Paul Burke, Christopher Marberry. Open Source Tools for Phishing Investigations |
231 | -- | 243 | Bob Radvanovsky. Analyzing Spoofed E-mail Headers |
245 | -- | 260 | Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond |
261 | -- | 262 | Peter Henry. A Review of: ::::Phishing Exposed: Uncover Secrets from the Dark Side::::. By Lance James ::::Phishing: Cutting the Identity Theft Line::::. By Rachel Lininger and Russell Dean Uines |