Login / Signup
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.
Craig M. McRae
Rayford B. Vaughn
Published in:
HICSS (2007)
Keyphrases
</>
phishing attacks
internet users
website
web pages
web documents
source code
user generated content
linked data
information retrieval
end users
web search
intrusion detection