Abstract is missing.
- Practice & prevention of home-router mid-stream injection attacksSteven Myers, Sid Stamm. 1-14 [doi]
- Lessons from a real world evaluation of anti-phishing trainingPonnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong. 1-12 [doi]
- Internet Situation AwarenessMalte Hesse, Norbert Pohlmann. 1-9 [doi]
- The consequence of non-cooperation in the fight against phishingTyler Moore, Richard Clayton. 1-14 [doi]
- Evolutionary study of phishingDanesh Irani, Steve Webb, Jonathon Giffin, Calton Pu. 1-10 [doi]
- A distributed architecture for phishing detection using Bayesian Additive Regression TreesSaeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair. 1-10 [doi]
- Legal risks for phishing researchersChristopher Soghoian. 1-11 [doi]
- Automating phishing website identification through deep MD5 matchingBrad Wardman, Gary Warner. 1-7 [doi]