Follow
Simon J. Bell
Simon J. Bell
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank
S Bell, P Komisarczuk
Proceedings of the Australasian Computer Science Week Multiconference, 1-11, 2020
922020
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists
S Bell, K Paterson, L Cavallaro
arXiv preprint arXiv:1912.02520, 2019
92019
Measuring the Effectiveness of Twitter’s URL Shortener (t. co) at Protecting Users from Phishing and Malware Attacks
S Bell, P Komisarczuk
Proceedings of the Australasian Computer Science Week Multiconference, 1-11, 2020
52020
Building a Honeypot to Research Cyber-Attack Techniques
S Bell
https://securehoney.net/dissertation.pdf, 2014
22014
How many phish can tweet?: investigating the effectiveness of Twitter's phishing and malware defence system
S Bell
Royal Holloway, University of London, 2021
12021
Building a Honeypot to Research Cyber-Attack Techniques — Interim Report
S Bell
https://securehoney.net/interim-report.pdf, 2013
12013
How Many Phish Can Tweet?
SJ Bell
2020
The system can't perform the operation now. Try again later.
Articles 1–7