default search action
Brad Wardman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j4]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - 2021
- [c17]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. SP 2021: 1109-1124 - 2020
- [c16]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c15]Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé:
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium 2020: 379-396
2010 – 2019
- 2019
- [c14]Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags, Brad Wardman:
Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. eCrime 2019: 1-10 - [c13]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers:
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. IEEE Symposium on Security and Privacy 2019: 1344-1361 - 2018
- [c12]Brad Wardman:
Managing the Crossroads of Academia and Industry. CODASPY 2018: 1 - [c11]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - 2016
- [c10]Blake Butler, Brad Wardman, Nate Pratt:
REAPER: an automated, scalable solution for mass credential harvesting and OSINT. eCrime 2016: 71-80 - 2014
- [j3]Brad Wardman, Jason Britt, Gary Warner:
New tackle to catch a phisher. Int. J. Electron. Secur. Digit. Forensics 6(1): 62-80 (2014) - 2013
- [c9]Brad Wardman, Lisa Kelly, Michael Weideman:
Voice of the customer. eCrime 2013: 1-7 - 2012
- [c8]Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner:
Clustering Potential Phishing Websites Using DeepMD5. LEET 2012 - 2011
- [c7]Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Brad Wardman, Gary Warner:
Evaluating a semisupervised approach to phishing url identification in a realistic scenario. CEAS 2011: 176-183 - [c6]Philip J. Nero, Brad Wardman, Heith Copes, Gary Warner:
Phishing: Crime that pays. eCrime Researchers Summit 2011: 1-10 - [c5]Brad Wardman, Tommy Stallings, Gary Warner, Anthony Skjellum:
High-performance content-based phishing attack detection. eCrime Researchers Summit 2011: 1-9 - [c4]Heather McCalley, Brad Wardman, Gary Warner:
Analysis of Back-Doored Phishing Kits. IFIP Int. Conf. Digital Forensics 2011: 155-168 - 2010
- [j2]Brad Wardman:
The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. J. Digit. Forensics Secur. Law 5(3): 33-56 (2010) - [c3]Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner:
Lexical feature based phishing URL detection using online learning. AISec 2010: 54-60
2000 – 2009
- 2009
- [c2]Brad Wardman, Gaurang Shukla, Gary Warner:
Identifying vulnerable websites by analysis of common strings in phishing URLs. eCrime 2009: 1-13 - 2008
- [c1]Brad Wardman, Gary Warner:
Automating phishing website identification through deep MD5 matching. eCrime 2008: 1-7 - 2007
- [j1]Najaf A. Shah, Richard J. Laws, Bradley Wardman, Lue Ping Zhao, John L. Hartman IV:
Accurate, precise modeling of cell proliferation kinetics from time-lapse imaging and automated image analysis of agar yeast culture arrays. BMC Syst. Biol. 1: 3 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint