enter search term and/or author name
Detecting visually similar Web pages: Application to phishing detection
Teh-Chung Chen, Scott Dick, James Miller
Article No.: 5
We propose a novel approach for detecting visual similarity between two Web pages. The proposed approach applies Gestalt theory and considers a Web page as a single indivisible entity. The concept of supersignals, as a realization of Gestalt...
BogusBiter: A transparent protection against phishing attacks
Chuan Yue, Haining Wang
Article No.: 6
Many anti-phishing mechanisms currently focus on helping users verify whether a Web site is genuine. However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect...
Phishing attacks, in which criminals lure Internet users to Web sites that spoof legitimate Web sites, are occurring with increasing frequency and are causing considerable harm to victims. While a great deal of effort has been devoted to solving...
Using probabilistic confidence models for trust inference in Web-based social networks
Ugur Kuter, Jennifer Golbeck
Article No.: 8
In this article, we describe a new approach that gives an explicit probabilistic interpretation for social networks. In particular, we focus on the observation that many existing Web-based trust-inference algorithms conflate the notions of...