Author of the publication

PhishCage: reproduction of fraudulent websites in the emulated internet.

, , , and . SimuTools, page 242-247. ICST/ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting anomalies in massive traffic with sketches., , , and . CFI, page 14:1-14:2. ACM, (2014)How much can we survive on an IPv6 network?: experience on the IPv6 only connectivity with NAT64/DNS64 at WIDE camp 2011 Autumn., , , , , and . AINTEC, page 144-151. ACM, (2011)The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies., , , , and . ICISSP, page 243-254. SciTePress, (2016)SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks., , and . AINTEC, volume 3837 of Lecture Notes in Computer Science, page 195-209. Springer, (2005)EtherPIPE: an ethernet character device for network scripting., , , , and . HotSDN, page 61-66. ACM, (2013)An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites., , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 539-546. Springer, (2008)HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites., , and . ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 548-555. Springer, (2009)Oblivious DDoS mitigation with locator/ID separation protocol., , and . CFI, page 8:1-8:6. ACM, (2014)Design of an FDB based Intra-domain Packet Traceback System., , and . ARES, page 1313-1318. IEEE Computer Society, (2008)Proposal of Constructing PKI on Overlay Network., , and . SAINT Workshops, page 64. IEEE Computer Society, (2007)