Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds

@article{Maggi2010AreTC,
  title={Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds},
  author={F. Maggi},
  journal={2010 10th IEEE International Conference on Computer and Information Technology},
  year={2010},
  pages={824-831}
}
  • F. Maggi
  • Published 2010
  • Computer Science
  • 2010 10th IEEE International Conference on Computer and Information Technology
Phishing is the practice of eliciting a person's confidential information such as name, date of birth or credit card details. Typically, the phishers use simple technologies (e.g., e-mailing) to spread social engineering attacks with the goal of persuading a large amount of victims into voluntarily disclose sensitive data. Phishing based on e-mail and web technologies is certainly the most popular form. It has indeed received ample attention and some mitigation measures have been implemented… Expand
A social-engineering-centric data collection initiative to study phishing
iVisher: Real‐Time Detection of Caller ID Spoofing
MobiPot: Understanding Mobile Telephony Threats with Honeycards
Phoneypot: Data-driven Understanding of Telephony Threats
The role of phone numbers in understanding cyber-crime schemes
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam
...
1
2
3
...

References

SHOWING 1-10 OF 45 REFERENCES
On the Effectiveness of Techniques to Detect Phishing Sites
The state of phishing
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
A framework for detection and measurement of phishing attacks
An Empirical Analysis of the Current State of Phishing Attack and Defence
Why phishing works
Phinding Phish: An Evaluation of Anti-Phishing Toolbars
The Art of Deception: Controlling the Human Element of Security
Behind Phishing: An Examination of Phisher Modi Operandi
The Economics of Online Crime
...
1
2
3
4
5
...