Abstract is missing.
- A framework for financial botnet analysisMarco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova. 1-7 [doi]
- NoTabNab: Protection against the "tabnabbing attack"Seckin Anil Unlu, Kemal Bicakci. 1-5 [doi]
- Automatically determining phishing campaigns using the USCAP methodologyRobert Layton, Paul A. Watters, Richard Dazeley. 1-8 [doi]
- Feature selection for Spam and Phishing detectionFergus Toolan, Joe Carthy. 1-12 [doi]
- On SCADA control system command and response injection and intrusion detectionWei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey. 1-9 [doi]
- Securing IS assets through hacker deterrence: A case studySean M. Zadig, Gurvirender P. Tejay. 1-7 [doi]
- Koobface: The evolution of the social botnetBrian K. Tanner, Gary Warner, Henry Stern, Scott Olechowski. 1-10 [doi]
- Authorship attribution of web forum postsSangita Pillay, Thamar Solorio. 1-7 [doi]