Phishing

  • M. Jakobsson, “Modeling and preventing phishing attacks,” in Financial cryptography, Roseau, The Commonwealth Of Dominica, 2005.
    [Bibtex]
    @inproceedings{modeling-phishing,
    address = {Roseau, The Commonwealth Of Dominica},
    author = {Jakobsson, Markus},
    booktitle = {Financial Cryptography},
    citeulike-article-id = {7845864},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    keywords = {fraud, phishing, publications},
    month = feb,
    organization = {IFCA},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Modeling and Preventing Phishing Attacks},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    year = {2005}
    }
  • M. Jakobsson, “The human factor in phishing,” in Privacy and security of consumer information ’07, 2007.
    [Bibtex]
    @inproceedings{thehuman-factor,
    author = {Jakobsson, Markus},
    booktitle = {Privacy and Security of Consumer Information '07},
    citeulike-article-id = {7845860},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Human Factor in Phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    year = {2007}
    }
  • V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad, “Phishing IQ tests measure fear, not ability,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 362-366.
    [Bibtex]
    @inproceedings{measure-fear,
    address = {Berlin, Heidelberg},
    author = {Anandpara, Vivek and Dingman, Andrew and Jakobsson, Markus and Liu, Debin and Roinestad, Heather},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845859},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {362--366},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Phishing {IQ} tests measure fear, not ability},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    year = {2007}
    }
  • M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y. Lim, “What instills trust? a qualitative study of phishing,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 356-361.
    [Bibtex]
    @inproceedings{instills-trust,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Tsow, Alex and Shah, Ankur and Blevis, Eli and Lim, Youn-Kyung},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845858},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {356--361},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {What instills trust? a qualitative study of phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    year = {2007}
    }
  • C. Soghoian, O. Friedrichs, and M. Jakobsson, “The threat of political phishing,” in International symposium on human aspects of information security & assurance (haisa 2008), Port Elizabeth, South Africa, 2008.
    [Bibtex]
    @inproceedings{political-phishing,
    address = {Port Elizabeth, South Africa},
    author = {Soghoian, Christopher and Friedrichs, Oliver and Jakobsson, Markus},
    booktitle = {International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2008)},
    citeulike-article-id = {7845854},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Threat of Political Phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    year = {2008}
    }
  • T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. acm, vol. 50, iss. 10, pp. 94-100, 2007.
    [Bibtex]
    @article{social-phishing,
    address = {New York, NY, USA},
    author = {Jagatic, Tom N. and Johnson, Nathaniel A. and Jakobsson, Markus and Menczer, Filippo},
    citeulike-article-id = {7845851},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    journal = {Commun. ACM},
    keywords = {facebook, fraud, most-downloaded, phishing, publications, user-experiments},
    number = {10},
    pages = {94--100},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Social phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    volume = {50},
    year = {2007}
    }
  • P. Finn and M. Jakobsson, “Designing and conducting phishing experiments,” in In ieee technology and society magazine, special issue on usability and security, 2007.
    [Bibtex]
    @inproceedings{Finn07designingand,
    author = {Finn, Peter and Jakobsson, Markus},
    booktitle = {In IEEE Technology and Society Magazine, Special Issue on Usability and Security},
    citeulike-article-id = {7845850},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    keywords = {fraud, most-downloaded, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {Designing and Conducting Phishing Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    year = {2007}
    }
  • M. Jakobsson and S. Stamm, “Web camouflage: protecting your clients from Browser-Sniffing attacks,” Ieee security and privacy, vol. 5, iss. 6, pp. 16-24, 2007.
    [Bibtex]
    @article{web-camoulfage,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    citeulike-article-id = {7845849},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, privacy, publications},
    number = {6},
    pages = {16--24},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Web Camouflage: Protecting Your Clients from {Browser-Sniffing} Attacks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    volume = {5},
    year = {2007}
    }
  • M. Jakobsson, N. Johnson, and P. Finn, “Why and how to perform fraud experiments,” Ieee security and privacy, vol. 6, iss. 2, pp. 66-68, 2008.
    [Bibtex]
    @article{fraud-exp,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Johnson, Nathaniel and Finn, Peter},
    citeulike-article-id = {7845848},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, publications, user-experiments},
    number = {2},
    pages = {66--68},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Why and How to Perform Fraud Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    volume = {6},
    year = {2008}
    }
  • S. Srikwan and M. Jakobsson, “Using cartoons to teach internet security,” Cryptologia, vol. 32, iss. 2, pp. 137-154, 2008.
    [Bibtex]
    @article{sec-cartoon,
    address = {Bristol, PA, USA},
    author = {Srikwan, Sukamol and Jakobsson, Markus},
    citeulike-article-id = {7845827},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    journal = {Cryptologia},
    keywords = {education, fraud, malware, phishing, publications},
    number = {2},
    pages = {137--154},
    posted-at = {2010-09-17 03:21:32},
    priority = {0},
    publisher = {Taylor \& Francis, Inc.},
    title = {Using Cartoons to Teach Internet Security},
    url = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    volume = {32},
    year = {2008}
    }
  • M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • M. Jakobsson and S. Myers, “Delayed password disclosure,” Int. j. appl. cryptol., vol. 1, iss. 1, pp. 47-59, 2008.
    [Bibtex]
    @article{delayed-pwd,
    address = {Inderscience Publishers, Geneva, SWITZERLAND},
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845757},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    journal = {Int. J. Appl. Cryptol.},
    keywords = {authentication, fraud, phishing, publications},
    number = {1},
    pages = {47--59},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Inderscience Publishers},
    title = {Delayed password disclosure},
    url = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    volume = {1},
    year = {2008}
    }
  • M. Jakobsson and A. Tsow, “Identify theft,” in Computer and information security handbook, J. R. Vacca, Ed., Burlington, MA: Morgan Kaufmann, 2008, p. 519.
    [Bibtex]
    @incollection{cis-handbook,
    address = {Burlington, MA},
    author = {Jakobsson, Markus and Tsow, Alex},
    booktitle = {Computer And Information Security Handbook},
    chapter = {31},
    citeulike-article-id = {7845754},
    editor = {Vacca, John R.},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    pages = {519},
    posted-at = {2010-09-17 03:05:09},
    priority = {0},
    publisher = {Morgan Kaufmann},
    title = {Identify Theft},
    year = {2008}
    }
  • M. Jakobsson, C. Soghoian, and S. Stamm, “Phishing,” in Handbook of financial cryptography, B. Rosenberg, Ed., CRC Press, 2008.
    [Bibtex]
    @incollection{handbook-fc,
    author = {Jakobsson, Markus and Soghoian, Christopher and Stamm, Sid},
    booktitle = {Handbook of Financial Cryptography},
    citeulike-article-id = {7845752},
    editor = {Rosenberg, Burton},
    keywords = {authentication, fraud, phishing, publications},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {CRC Press},
    title = {Phishing},
    year = {2008}
    }
  • M. Jakobsson and S. Myers, Phishing and countermeasures: understanding the increasing problem of electronic identity theft, Wesley, 2006.
    [Bibtex]
    @book{phishing-book,
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845751},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {Wesley},
    title = {Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
    year = {2006}
    }

Comments are closed.