1 |
Anti-Phishing Working Group, "Phishing Activity Trends Report 4th Quarter 2012," Anti-Phishing Working Group, Apr. 2013.
|
2 |
T.D. Wilson, Strangers to Ourselves: Discovering the Adaptive Unconscious. Cambridge, MA: Harvard Univ. Press, 2002.
|
3 |
R.J. Anderson, Security engineering: a guide to building dependable distributed systems 2nd Ed., Wiley, Apr. 2008.
|
4 |
D. Rachna and J.D. Tygar, "The battle against phishing: Dynamic security skin," Proceedings of the Symposium on Usable Privacy and Security, pp. 77-88, Jul. 2005.
|
5 |
S. Kim, S. Lee and S. Jin, "Active Phishing Attack and its Countermeasures," Electronics and Telecommunications Trends, vol. 28, no. 3, ETRI, 2013.
|
6 |
S. Gastellier-Prevost and M. Laurent, "Defeating pharming attacks at the client-side," Network and System Security(NSS), 2011 5th International Conference on. IEEE, pp. 33-40, 2011.
|
7 |
J. Kang, E. Cho, S. Lee, "Analysis of Phishing URL using Internet Registration Authority," Review of KIISC, vol. 23, no. 6, pp. 13-20, Dec. 2013.
|
8 |
Y. Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, vol. 14, no. 3, pp. 15-21, June. 2013.
과학기술학회마을
DOI
ScienceOn
|
9 |
T. Kim, B. Park and T. Park, "An Augmented Memory System using Associated Words and Social Network Service," Journal of Korean Society for Internet Information, vol. 11, no. 6, pp. 41-50, Dec. 2010.
과학기술학회마을
|
10 |
H. Christopher, Social Engineering The Art of Human Hacking, John Wiley & Sons Inc, Dec. 2010.
|
11 |
H. Ryu, M. Hong and T. Kwon, "A Study of Multiple Password Leakage Factors Caused by Phishing and Pharming Attacks," Journal of the Korea Institute of Information Security and Cryptology, vol. 23, no. 6, pp. 1225-1229, Dec. 2013.
과학기술학회마을
DOI
ScienceOn
|
12 |
D. Rachna, J.D. Tygar and M. Hearst, "Why phishing works," Proceedings of the SIGCHI conference on Human Factors in Computing, pp. 581-590, Apr. 2006.
|
13 |
M. Hong, H. Ryu and T. Kwon, "The Impact of Unconscious User Authentication Process on the Leakage of Passwords-Focussing on Phishing," Proceedings of the Korean Society for Internet Information Conference, vol. 14, no. 2, pp. 73-74, Nov. 2013.
|