Gary Warner
Gary Warner
Director of Research in Computer Forensics, University of Alabama at Birmingham
Verified email at - Homepage
Cited by
Cited by
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
Lexical feature based phishing URL detection using online learning
A Blum, B Wardman, T Solorio, G Warner
Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security …, 2010
System and method for branding a phishing website using advanced pattern matching
G Warner, B Wardman
US Patent 8,381,292, 2013
Mining spam email to identify common origins for forensic application
C Wei, A Sprague, G Warner, A Skjellum
Proceedings of the 2008 ACM symposium on Applied computing, 1433-1437, 2008
System and method for identifying a phishing website
G Warner, B Wardman
US Patent 8,468,597, 2013
High-performance content-based phishing attack detection
B Wardman, T Stallings, G Warner, A Skjellum
2011 eCrime Researchers Summit, 1-9, 2011
A Multimodal Data Mining Framework for Revealing Common Sources of Spam Images.
C Zhang, WB Chen, X Chen, R Tiwari, L Yang, G Warner
Journal of multimedia 4 (5), 2009
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis
A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
Identifying vulnerable websites by analysis of common strings in phishing URLs
B Wardman, G Shukla, G Warner
2009 eCrime Researchers Summit, 1-13, 2009
Automating phishing website identification through deep MD5 matching
B Wardman, G Warner
2008 eCrime Researchers Summit, 1-7, 2008
Evaluating a semisupervised approach to phishing url identification in a realistic scenario
B Gyawali, T Solorio, M Montes-y-Gómez, B Wardman, G Warner
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
Analysis of back-doored phishing kits
H McCalley, B Wardman, G Warner
IFIP International Conference on Digital Forensics, 155-168, 2011
Clustering potential phishing websites using DeepMD5
J Britt, B Wardman, A Sprague, G Warner
5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12), 2012
Phishing: Crime that pays
PJ Nero, B Wardman, H Copes, G Warner
2011 eCrime Researchers Summit, 1-10, 2011
Koobface: The evolution of the social botnet
BK Tanner, G Warner, H Stern, S Olechowski
2010 eCrime Researchers Summit, 1-10, 2010
Automating phishing website identification through deep MD5 matching. In eCrime Researchers Summit, 2008
B Wardman, G Warner
Atlanta, GA, 2008
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm
C Wei, A Sprague, G Warner
Proceedings of the 2009 ACM symposium on Applied Computing, 889-890, 2009
Social media image retrieval using distilled convolutional neural network for suspicious e-crime and terrorist account detection
P Chitrakar, C Zhang, G Warner, X Liao
2016 IEEE International Symposium on Multimedia (ISM), 493-498, 2016
System and method for conducting a non-exact matching analysis on a phishing website
G Warner, B Wardman
US Patent 8,495,735, 2013
Reeling in big phish with a deep md5 net
B Wardman, G Warner, H McCalley, S Turner, A Skjellum
Journal of Digital Forensics, Security and Law 5 (3), 2, 2010
The system can't perform the operation now. Try again later.
Articles 1–20