Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Engin Kirda and Christopher Kruegel 2005 ,” Protecting Users Against Phishing Attacks with AntiPhish”. Computer Software and Applications Conference, COMPSAC 2005. 29th Annual International (Volume: 1 ).
    2. Craig M. McRae Rayford B. Vaughn 2007 ,” Phighting the Phisher:Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks “,Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
    3. Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei Bidgoli 2007, “Learn To Detect Phishing Scams Using Learning and Ensemble Methods”, Proceedings of the 2007 IEEE/WIC/ACM. [4] M. Young, The Technical Writer’s Handbook. Mill Valley,.
    4. Anti-Phishing Working Group (2009) “Phishing Activity Trends Report: 3rd Quarter 2009” Availablehttp://www.antiphishing.org/reports/apwg_report _Q3_2009.pdf (Accessed: 15 January 2010).
    5. Dhamija, R., Tygar, J.D. and Hearst, M. (2006) “Why Phishing Works”, Proceedings of the SIGCHI conference on Human Factors in computing systems, Montréal, Québec, Canada. pp. 581-590.
    6. Gartner (2010) “Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks”. [8]http://www.gartner.com/it/page.jsp?id=565125 (Accessed: 21 January 2010).
    7. Herzberg, A. and Jbara, A. (2008) “Security and Identification Indicators for Browsers against Spoofing and Phishng Attacks” ACM Transaction on Internet Technology
    8. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menezer, F. (2007) “Social Phishing

Recent Article