Gary Warner
Gary Warner
Director of Research in Computer Forensics, University of Alabama at Birmingham
Verified email at - Homepage
Cited by
Cited by
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
Lexical feature based phishing URL detection using online learning
A Blum, B Wardman, T Solorio, G Warner
Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security …, 2010
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis
A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
System and method for branding a phishing website using advanced pattern matching
G Warner, B Wardman
US Patent 8,381,292, 2013
A flow-based approach for Trickbot banking trojan detection
A Gezer, G Warner, C Wilson, P Shrestha
Computers & Security 84, 179-192, 2019
System and method for identifying a phishing website
G Warner, B Wardman
US Patent 8,468,597, 2013
Mining spam email to identify common origins for forensic application
C Wei, A Sprague, G Warner, A Skjellum
Proceedings of the 2008 ACM symposium on Applied computing, 1433-1437, 2008
High-performance content-based phishing attack detection
B Wardman, T Stallings, G Warner, A Skjellum
2011 eCrime Researchers Summit, 1-9, 2011
A multimodal data mining framework for revealing common sources of spam images.
C Zhang, WB Chen, X Chen, R Tiwari, L Yang, G Warner
Journal of multimedia 4 (5), 2009
Identifying vulnerable websites by analysis of common strings in phishing URLs
B Wardman, G Shukla, G Warner
2009 eCrime Researchers Summit, 1-13, 2009
Automating phishing website identification through deep MD5 matching
B Wardman, G Warner
2008 eCrime Researchers Summit, 1-7, 2008
Social media image retrieval using distilled convolutional neural network for suspicious e-crime and terrorist account detection
P Chitrakar, C Zhang, G Warner, X Liao
2016 IEEE International Symposium on Multimedia (ISM), 493-498, 2016
Analysis of back-doored phishing kits
H McCalley, B Wardman, G Warner
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference …, 2011
Evaluating a semisupervised approach to phishing url identification in a realistic scenario
B Gyawali, T Solorio, M Montes-y-Gómez, B Wardman, G Warner
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
Clustering Potential Phishing Websites Using {DeepMD5}
J Britt, B Wardman, A Sprague, G Warner
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012
Koobface: The evolution of the social botnet
BK Tanner, G Warner, H Stern, S Olechowski
2010 eCrime Researchers Summit, 1-10, 2010
Phish-net: investigating phish clusters using drop email addresses
S Zawoad, AK Dutta, A Sprague, R Hasan, J Britt, G Warner
2013 APWG eCrime Researchers Summit, 1-13, 2013
Phishing: Crime that pays
PJ Nero, B Wardman, H Copes, G Warner
2011 eCrime Researchers Summit, 1-10, 2011
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm
C Wei, A Sprague, G Warner
Proceedings of the 2009 ACM symposium on Applied Computing, 889-890, 2009
Automating phishing website identification through deep MD5 matching. In eCrime Researchers Summit, 2008
B Wardman, G Warner
Atlanta, GA, 2008
The system can't perform the operation now. Try again later.
Articles 1–20