Some thoughts about anti-phishing

被引:0
|
作者
Jenq, John [1 ]
Cheng, Rex [1 ]
机构
[1] Montclair State Univ, Dept Comp Sci, Montclair, NJ 07043 USA
关键词
identity theft; spam; anti-phishing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this report, we examine topics related to identity theft and focus on the issues of phishing, and anti-phishing. We list some of the possible current and future challenges, and propose some methods to counter the anti-phishing attacks.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [31] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [32] Interface Design Elements for Anti-phishing Systems
    Chen, Yan
    Zahedi, Fatemeh
    Abbasi, Ahmed
    SERVICE-ORIENTED PERSPECTIVES IN DESIGN SCIENCE RESEARCH: 6TH INTERNATIONAL CONFERENCE, 2011, 6629 : 253 - 265
  • [33] Emergent Challenges and IPDS for Anti-Phishing Attack
    Li Bing
    Sun Ruifeng
    Fang Xin
    Luo Xue
    Chang Wei-hao
    2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
  • [34] Identifying an OpenID anti-phishing scheme for cyberspace
    Abbas, Haider
    Mahmoodzadeh, Moeen Qaemi
    Khan, Farrukh Aslam
    Pasha, Maruf
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 481 - 491
  • [35] Anti-Phishing Using Hadoop-Framework
    Gavahane, Mayura
    Sequeira, Derick
    Pandey, Abhishek
    Shetty, Anush
    2015 INTERNATIONAL CONFERENCE ON TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICTSD-2015), 2015,
  • [36] PhishTackle—a web services architecture for anti-phishing
    R. Gowtham
    Ilango Krishnamurthi
    Cluster Computing, 2014, 17 : 1051 - 1068
  • [37] An Anti-Phishing Method based on Feature Analysis
    Rajab, Majed
    2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, : 133 - 139
  • [38] How Effective is Anti-Phishing Training for Children?
    Lastdrager, Elmer
    Gallardo, Ines Carvajal
    Hartel, Pieter
    Junger, Marianne
    PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), 2017, : 229 - 239
  • [39] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [40] 2 Years in the anti-phishing group of a large company
    Gallo, Luigi
    Maiello, Alessandro
    Botta, Alessio
    Ventre, Giorgio
    COMPUTERS & SECURITY, 2021, 105