Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2020
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank
ACSW '20: Proceedings of the Australasian Computer Science Week MulticonferenceArticle No.: 3, Pages 1–11https://doi.org/10.1145/3373017.3373020Blacklists play a vital role in protecting internet users against phishing attacks. The effectiveness of blacklists depends on their size, scope, update speed and frequency, and accuracy - among other characteristics. In this paper we present a ...
- research-articleFebruary 2020
Measuring the Effectiveness of Twitter’s URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks
ACSW '20: Proceedings of the Australasian Computer Science Week MulticonferenceArticle No.: 2, Pages 1–11https://doi.org/10.1145/3373017.3373019In this paper we investigate how effective Twitter’s URL shortening service (t.co) is at protecting users from phishing and malware attacks. We show that over 10,000 unique blacklisted phishing and malware URLs were posted to Twitter during a 2-month ...
- research-articleNovember 2015
On the ground truth problem of malicious DNS traffic analysis
Computers and Security (CSEC), Volume 55, Issue CPages 142–158https://doi.org/10.1016/j.cose.2015.09.004DNS is often abused by Internet criminals in order to provide flexible and resilient hosting of malicious content and reliable communication within their network architecture. The majority of detection methods targeting malicious DNS traffic are data-...