Cited By
View all- Ding YWei TWang TLiang ZZou WGates CFranz MMcDermott J(2010)Heap TaichiProceedings of the 26th Annual Computer Security Applications Conference10.1145/1920261.1920310(327-336)Online publication date: 6-Dec-2010
- Kartaltepe EXu S(2005)On Automatically Detecting Malicious Impostor EmailsProceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 200510.5555/1564104.1564109(33-47)Online publication date: 9-May-2005
- Payton AWhitman M(2005)Determining the proper response to online extortionProceedings of the 2nd annual conference on Information security curriculum development10.1145/1107622.1107651(122-126)Online publication date: 23-Sep-2005
- Show More Cited By