Sciweavers

524 search results - page 24 / 105
» Why phishing works
Sort
View
CCS
2010
ACM
13 years 8 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
PEPM
1999
ACM
14 years 22 days ago
Quasiquotation in Lisp
Quasiquotation is the technology commonly used in Lisp to write program-generating programs. In this paper I will review the history and development of this technology, and explai...
Alan Bawden
EACL
1993
ACL Anthology
13 years 9 months ago
Abductive Explanation of Dialogue Misunderstandings
To respond to an utterance, a listener must interpret what others have said and why they have said it. Misunderstandings occur when agents differ in their beliefs about what has b...
Susan McRoy, Graeme Hirst
SIGIR
2012
ACM
11 years 11 months ago
Unsupervised linear score normalization revisited
We give a fresh look into score normalization for merging result-lists, isolating the problem from other components. We focus on three of the simplest, practical, and widelyused l...
Ilya Markov, Avi Arampatzis, Fabio Crestani
ACSAC
2007
IEEE
14 years 2 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...