- Chen Wei, Alan Sprague, and Gary Warner
Clustering Malware-generated Spam Emails with a Novel Fuzzy String Matching Algorithm - Chun Wei, Alan Sprague, Gary warner, and Anthony Skjellum
Mining Spam Email to Identify Common Origins for Forensic Application - Steve Sheng, Brad Wardman, Gary Warner, Lorrie Faith Cranor, Jason Hong, and Chengshan Zhang An Empirical Analysis of Phishing Blacklists
- Brad Wardman and Gary Warner
Automating Phishing Website Identification - Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gomez, Bradley Wardman, and Gary Warner
Evaluating a Semisupervised Approach to Phishing URL Identification in a Realistic Scenario - Brad Wardman, Tommy Stallings, Gary warner, and Anthony Skjellum
High-Performance Content-Based Phishing Attack Detection - Brad Wardman, Gaurang Shukla, and Gary Warner
Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs - Philip J. Nero, Brad Wardman, Heith Copes, and Gary Warner
Phishing: Crime that Pays - Chengcui Zhang, Wei-Bang Chen, Xin Chen, and Gary Warner
Revealing Common Sources of Image Spam by Unsupervised Clustering with Visual Features - Mark B. Schmidt, Allen C. Johnston, Krik P. Arnet, Jim Q. Chen, and Suicheng Li
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness - Allen C. Johnston and Merrill Warkentin
Fear Appeals and Information Security Behaviors: An Empirical Study - Allen C. Johnston, Mark B. Schmidt, Kirk P. Arnett, and Jeff Thomas
Getting to the Root of the Problem - Jordan D. Shropshire, Merrill warkentin, and Allen C. Johnston
Impact of Negative Message Framing on Security Adoption - Allen C. Johnston, and Ron Hale
Improved Security through Information Security Governance - Allen C. Joohnston and Merrill Warkentin
Information Privacy Compliance in the Healthcare Industry - Qingxiong Ma, Allen C. Johnston, and J. Michael Pearson
Information Security Management Objectives and Practices — A Parsimonious Framework - Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, and HJ Hwang
Rootkits and What We Know — Assessing US and Korean Knowledge and Perceptions - Merrill Warkentin, Allen C. Johnston, and Jordan Shropshire
The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention - Rigib Hasan, Radu Sion, and Marianne Winslet
Preventing History Forgery with Secure Provenance - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostianinen, and N. Asokan
Secure Device Pairing based on a Visual Channel - Tzipora Halevi and Nitesh Saxena
On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels — The Case of Acoustic Eavesdropping - Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu
Password-protected Secret Sharing - Gretchen Parisi
E-Prescribing: A Feasibility Study for Redmond Dental, Inc. - Matthew L. Curry, Anthony Skjellum, H. Lee Ward, and Ron Brightwell
Gibraltar-A Reed-Solomon Coding Library for Storage - Julio C. Rivera
Considering Information Security - Heith Copes and Lynne M. Vieraitis
Bounded Rationality of Identity Thieves: Using Offender-based Research to Inform Policy - Heith Copes, Lynne Vieraitis, and Jennifer M. Jochum
Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves - Tommie W. Singleton, Julio c. Rivera, William A. Hailey, and Edward M. Curry
The Use of Encryption in IT Control and in the Security of Data and Information - Heith Copes, Kent R. Kerly, Rodney Huff, and John Kane
Differentiating Identity Theft: An Exploratory Study of Victims Using a National Victimization Survey - Heith Copes and Lynne M. Vieraitis
Understanding Identity Theft — Offenders’ Accounts of Their Lives and Crimes - Heith Copes, Lynne M. Vieraitis, Stephanie M. Cardwell and Arthur Vasquez
Accounting for Identity Theft — The Roles of Lifestyle and Enactment - Allen C. Johnston, Barbara Wech, and Eric Jack
Engaging Remote Employees — The Moderating Role of Remote Status in Determining Employee Information Security Policy Awareness - Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Savena, Chengcui Zhang, Ponnurangam, Kumaraguru, Paul C. van Oorschot, Wei-Bang ChenS
Three-way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability - Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, and Dustin Rinehart
Sensing-Enabled Channels for Hard-to-detect Command and Control of Mobile Devices - Tzipora Halevi and Nitesh Saxena
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing - Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, and Dinko Begusic
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User - Di Ma, Nitesh Saxena, Tuo Xiang, and Yan Zhu
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing - Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, and Yan Zhu
Tap-Wave-Rub-Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures