Internet Technology (TOIT)


Search Issue
enter search term and/or author name


ACM Transactions on Internet Technology (TOIT), Volume 10 Issue 2, May 2010

Detecting visually similar Web pages: Application to phishing detection
Teh-Chung Chen, Scott Dick, James Miller
Article No.: 5
DOI: 10.1145/1754393.1754394

We propose a novel approach for detecting visual similarity between two Web pages. The proposed approach applies Gestalt theory and considers a Web page as a single indivisible entity. The concept of supersignals, as a realization of Gestalt...

BogusBiter: A transparent protection against phishing attacks
Chuan Yue, Haining Wang
Article No.: 6
DOI: 10.1145/1754393.1754395

Many anti-phishing mechanisms currently focus on helping users verify whether a Web site is genuine. However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect...

Teaching Johnny not to fall for phish
Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong
Article No.: 7
DOI: 10.1145/1754393.1754396

Phishing attacks, in which criminals lure Internet users to Web sites that spoof legitimate Web sites, are occurring with increasing frequency and are causing considerable harm to victims. While a great deal of effort has been devoted to solving...

Using probabilistic confidence models for trust inference in Web-based social networks
Ugur Kuter, Jennifer Golbeck
Article No.: 8
DOI: 10.1145/1754393.1754397

In this article, we describe a new approach that gives an explicit probabilistic interpretation for social networks. In particular, we focus on the observation that many existing Web-based trust-inference algorithms conflate the notions of...