An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank S Bell, P Komisarczuk Proceedings of the Australasian Computer Science Week Multiconference, 1-11, 2020 | 103 | 2020 |
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists S Bell, K Paterson, L Cavallaro arXiv preprint arXiv:1912.02520, 2019 | 11 | 2019 |
Measuring the Effectiveness of Twitter’s URL Shortener (t. co) at Protecting Users from Phishing and Malware Attacks S Bell, P Komisarczuk Proceedings of the Australasian Computer Science Week Multiconference, 1-11, 2020 | 6 | 2020 |
Building a Honeypot to Research Cyber-Attack Techniques S Bell https://securehoney.net/dissertation.pdf, 2014 | 2 | 2014 |
How many phish can tweet?: investigating the effectiveness of Twitter's phishing and malware defence system S Bell Royal Holloway, University of London, 2021 | 1 | 2021 |
Building a Honeypot to Research Cyber-Attack Techniques — Interim Report S Bell https://securehoney.net/interim-report.pdf, 2013 | 1 | 2013 |
How Many Phish Can Tweet? SJ Bell | | 2020 |