Login / Signup

Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.

Craig M. McRaeRayford B. Vaughn
Published in: HICSS (2007)
Keyphrases
  • phishing attacks
  • internet users
  • website
  • web pages
  • web documents
  • source code
  • user generated content
  • linked data
  • information retrieval
  • end users
  • web search
  • intrusion detection