1 |
terms, http://www.termscokr/spyware.htm
|
2 |
NISR. 'The Pharming Guide', NGS Software Ltd., 2005
|
3 |
'Proposed Solutions to Address the Threat of Email Spoofing Scams', The Anti-Phishing Working Group, Dec. 2003
|
4 |
Gunter Ollmann, 'URL Encoded Attacks', 2002
|
5 |
인터넷침해사고대응지원센터, '피싱 사이트 악용 서버 분석 사례', KISA, 2005
|
6 |
The Open Web Application Security Project(OWASP) Foundation, http://www.owasp.org/
|
7 |
Gunter Ollmann, 'Security Best Practice: Host Naming and URL Conventions', 2005
|
8 |
Danny Allan, 'Identity Theft, Phishing and harming: Accountability & Responsibilities', OWASP AppSec, Oct. 2005
|
9 |
NORAD(The North American Aerospace Defense Command), http://www.norad.mil
|
10 |
Anti-Phishing Working Group, http://www.antiphishing.org/
|
11 |
Joe Stewart, 'DNS Cache Poisoning - The Next Generation', 2003
|
12 |
NISR, 'The Phishing Guide', NGS Software Ltd., 2004
|
13 |
APWG, 'Phishing Activity Trends Report', Nov. 2005
|
14 |
한국정보호호진흥원, '인터넷 침해사고 동향 및 분석 월보 2005년 12월', 2005. 1
|
15 |
Steven Musil, 'ISP Panix over domain hijack', CNET News.com, Jan 17, 2005
|
16 |
'Anti-Phishing Best Practices for Institutions and Consumers', McAfee, March 2004
|
17 |
인터넷침해사고대응지원센터, 'SPAM BOT을 이용한 Phishing SPAM 발송 시스템 보고서', KISA, 2005
|