Brad Wardman

According to our database1, Brad Wardman authored at least 20 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

Managing the Crossroads of Academia and Industry.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
REAPER: an automated, scalable solution for mass credential harvesting and OSINT.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

2014
New tackle to catch a phisher.
Int. J. Electron. Secur. Digit. Forensics, 2014

2013
Voice of the customer.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2012
Clustering Potential Phishing Websites Using DeepMD5.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

2011
Analysis of Back-Doored Phishing Kits.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

High-performance content-based phishing attack detection.
Proceedings of the 2011 eCrime Researchers Summit, 2011

Phishing: Crime that pays.
Proceedings of the 2011 eCrime Researchers Summit, 2011

Evaluating a semisupervised approach to phishing url identification in a realistic scenario.
Proceedings of the 8th Annual Collaboration, 2011

2010
The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net.
J. Digit. Forensics Secur. Law, 2010

Lexical feature based phishing URL detection using online learning.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Identifying vulnerable websites by analysis of common strings in phishing URLs.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Automating phishing website identification through deep MD5 matching.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
Accurate, precise modeling of cell proliferation kinetics from time-lapse imaging and automated image analysis of agar yeast culture arrays.
BMC Syst. Biol., 2007


  Loading...