Articles by Gary
Activity
-
Checked into a random hotel recently and found this on the bathroom wall: an anti-scam poster from the local police. It reads: “Top 10 Anti-Fraud…
Checked into a random hotel recently and found this on the bathroom wall: an anti-scam poster from the local police. It reads: “Top 10 Anti-Fraud…
Liked by Gary Warner
-
Let’s talk about crypto tracing graph hygiene. When you’re first starting your investigation, it’s easy to make a mess and spiral out of control, or…
Let’s talk about crypto tracing graph hygiene. When you’re first starting your investigation, it’s easy to make a mess and spiral out of control, or…
Liked by Gary Warner
-
Three more Chinese “collection crew” members, Houjie Lin, Yi-Hsun Wu, and Hsai Lin have been arrested for gift card fraud in Texas. As Homeland…
Three more Chinese “collection crew” members, Houjie Lin, Yi-Hsun Wu, and Hsai Lin have been arrested for gift card fraud in Texas. As Homeland…
Shared by Gary Warner
Experience
Publications
-
Tracking Criminals on Facebook: A Case Study from a Digital Forensics REU Program
See publicationPresented at the 10th Annual ADFSL Conference on Digital Forensics, Security and Law
-
Spam Campaign Cluster Detection using Redirected URLs and Randomized Sub-Domains
SocialInformatics 2014
-
Phish-Net: Investigating Phish Clusters Using Drop Email Addresses
APWG eCrime Researchers Summit
-
Koobface, the Evolution of the Social Botnet
IEEE
A paper accepted at the Anti Phishing Working Group Ecrimes Researchers' Summit in Dallas Texas October, 2010. Paper was published and presented at this conference.
-
Lexical Feature Based Phishing URL Detection Using Online Learning
AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
This paper evaluated machine learning techniques to determine whether phishing URLs have distinguishing characteristics that, when taken as an ensemble, can identify likely phish solely based on the nature of their URL.
Other authors -
-
An Empirical Analysis of Phishing Blacklists
Sixth Conference on Email and Anti-Spam
This paper demonstrated that newly identified phishing websites were very poorly detected by current anti-phishing toolbars. The findings differ from previous findings primarily because we detected the emerging phish so much earlier than previous researchers.
Other authorsSee publication -
Mining spam email to identify common origins for forensic application
SAC '08 Proceedings of the 2008 ACM symposium on Applied computing
This paper was the first publication of how the UAB Spam Data Mine extracts metadata about spam messages and uses that information to create clusters based on an agglomerative hierarchical clustering algorithm.
Other authorsSee publication
Patents
-
System and method for conducting a non-exact matching analysis on a phishing website
Issued US 8495735
A system and method for enhancing spam avoidance efficiency by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then…
A system and method for enhancing spam avoidance efficiency by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then compared to similarity data of known phishing websites. Various types of similarity measure methodologies are potentially incorporated and a similarity threshold value can be varied in order to respond to phishing threats.
Other inventorsSee patent -
System and method for identifying a phishing website
Issued US 8468597
A system and method for enhancing spam avoidance efficiency by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then…
A system and method for enhancing spam avoidance efficiency by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then compared to similarity data of known phishing websites. Various types of categorization structures and notification strategies are utilized in the system.
Other inventorsSee patent -
System and method for branding a phishing website using advanced pattern matching
Issued US 8381292
A system and method for enhancing spam avoidance efficiency and brand protection by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing…
A system and method for enhancing spam avoidance efficiency and brand protection by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then compared to similarity data of known phishing websites and known brands to determine whether the site needs human intervention. Various types of categorization structures and notification strategies are utilized in the system, including the adjustment of threshold comparison values in response to the identification of a potential phishing site displaying a brand of interest.
Other inventorsSee patent
Courses
-
Computer Forensics
CJ402 / CJ502
-
Computer Security
CS436
-
Digital Media Forensics
CJ437/CJ537
-
Investigating Malicious Attacks
CJ-438/538
-
Investigating Online Crime
CJ437/CJ537
-
Malware Analysis
CJ 407
-
Terrorism and Intelligence
JS340
Organizations
-
Birmingham InfraGard
-
- PresentThe Birmingham InfraGard chapter held its first meeting in my auditorium at Energen Headquarters on September 6, 2001. We still meet monthly. For details, see: http://www.birmingham-infragard.org
Recommendations received
8 people have recommended Gary
Join now to viewMore activity by Gary
-
Last night Dr John Dempsey and I had the pleasure of attending the Centre for Volunteering and Community Leadership (CVCL) Awards University of…
Last night Dr John Dempsey and I had the pleasure of attending the Centre for Volunteering and Community Leadership (CVCL) Awards University of…
Liked by Gary Warner
-
The joke of an indictment against the Honorable James Comey charges Comey with threatening harm to President Trump because of an Instagram post of…
The joke of an indictment against the Honorable James Comey charges Comey with threatening harm to President Trump because of an Instagram post of…
Shared by Gary Warner
-
Brian Buchanan of North Carolina was sentenced to over a year in prison for his involvement in a group engaged in refund fraud. This type of fraud…
Brian Buchanan of North Carolina was sentenced to over a year in prison for his involvement in a group engaged in refund fraud. This type of fraud…
Liked by Gary Warner
-
It was an enormous privilege today to welcome my friend and colleague Dr Claire Norman-Maillet CAFS, CFE, FICA, FIoL, FRSA who gave what was an…
It was an enormous privilege today to welcome my friend and colleague Dr Claire Norman-Maillet CAFS, CFE, FICA, FIoL, FRSA who gave what was an…
Liked by Gary Warner
-
I was doing some research today, and i started by asking DeepSeek AI to follow an extra system prompt. It's reply was "unexpected" to say the least.…
I was doing some research today, and i started by asking DeepSeek AI to follow an extra system prompt. It's reply was "unexpected" to say the least.…
Liked by Gary Warner
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content