-
1
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
Pittsburgh, PA, USA
-
S. Abu-Nimeh, D. Nappa, X. Wang and S. Nair, A comparison of machine learning techniques for phishing detection, in: Proceedings of the eCrime Researchers Summit, Pittsburgh, PA, USA, 2007, pp. 60-69.
-
(2007)
Proceedings of the ECrime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
3
-
-
71749083476
-
-
accessed on 25.01.08
-
Bank Austria, Faq mobile TAN, 2008; http://www.bankaustria.at/de/19825. html, accessed on 25.01.08.
-
(2008)
Faq Mobile TAN
-
-
-
4
-
-
84904815319
-
Improved phishing detection using model-based features
-
Mountain View, CA, USA
-
A. Bergholz, J.-H. Chang, G. Paaß, F. Reichartz and S. Strobel, Improved phishing detection using model-based features, in: Proceedings of the Conference on Email and Anti-Spam (CEAS),Mountain View, CA, USA, 2008.
-
(2008)
Proceedings of the Conference on Email and Anti-Spam (CEAS)
-
-
Bergholz, A.1
Chang, J.-H.2
Paaß, G.3
Reichartz, F.4
Strobel, S.5
-
5
-
-
48149098577
-
Image spam filtering using visual information
-
Washington, DC, USA
-
B. Biggio, G. Fumera, I. Pillai and F. Roli, Image spam filtering using visual information, in: ICIAP '07: Proceedings of the 14th International Conference on Image Analysis and Processing, IEEE Computer Society, Washington, DC, USA, 2007, pp. 105-110.
-
(2007)
ICIAP '07: Proceedings of the 14th International Conference on Image Analysis and Processing, IEEE Computer Society
, pp. 105-110
-
-
Biggio, B.1
Fumera, G.2
Pillai, I.3
Roli, F.4
-
7
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, G.V. Cormack, B. Filipic, T.R. Lynam and B. Zupan, Spam filtering using statistical data compression models, Journal of Machine Learning Research 6 (2006), 2673-2698.
-
(2006)
Journal of Machine Learning Research
, vol.6
, pp. 2673-2698
-
-
Bratko, A.1
Cormack, G.V.2
Filipic, B.3
Lynam, T.R.4
Zupan, B.5
-
8
-
-
0035478854
-
Random forests
-
L. Breiman, Random forests, Machine Learning 45(1) (2001), 5-32.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
9
-
-
84904818217
-
A discriminative classifier learning approach to image modeling and spam image identification
-
August 2-3 2007, Mountain View, CA, USA
-
B. Byun, C.-H. Lee, S. Webb and C. Pu, A discriminative classifier learning approach to image modeling and spam image identification, in: CEAS 2007 Fourth Conference on Email and Anti- Spam, August 2-3, 2007, Mountain View, CA, USA, 2007.
-
(2007)
CEAS 2007 Fourth Conference on Email and Anti-Spam
-
-
Byun, B.1
Lee, C.-H.2
Webb, S.3
Pu, C.4
-
10
-
-
0013243462
-
-
Technical report, IRST, Trento, Italy
-
R. Cattoni, T. Coianiz, S. Messelodi and C. Modena, Geometric layout analysis techniques for document image understanding: A review, Technical report, IRST, Trento, Italy, 1998.
-
(1998)
Geometric Layout Analysis Techniques for Document Image Understanding: A Review
-
-
Cattoni, R.1
Coianiz, T.2
Messelodi, S.3
Modena, C.4
-
12
-
-
71749100953
-
-
accessed on 11.05.08
-
Commtouch, Commtouch q3 spam statistics: Spam problem reaches new peak, expands in every dimension, 2008; http://www.commtouch.com/Site/News-Events/pr- content.asp?news-id=767&cat-id=1, accessed on 11.05.08.
-
(2008)
Spam Problem Reaches New Peak, Expands in Every Dimension
-
-
-
13
-
-
0023536787
-
Data compression using dynamic Markov modelling
-
G.V. Cormack and R.N. Horspool, Data compression using dynamic Markov modelling, The Computer Journal 30(6) (1987), 541-550.
-
(1987)
The Computer Journal
, vol.30
, Issue.6
, pp. 541-550
-
-
Cormack, G.V.1
Horspool, R.N.2
-
14
-
-
33745816410
-
Why phishing works
-
Montreal, Canada
-
R. Dhamija, J.D. Tygar and M. Hearst, Why phishing works. in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montreal, Canada, 2006, pp. 581-590.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
15
-
-
84889328778
-
Phishing attacks: Information flow and chokepoints
-
M. Jakobsson and S. Myers, eds, Wiley
-
A. Emigh, Phishing attacks: Information flow and chokepoints, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 31-64.
-
(2007)
Phishing and Countermeasures
, pp. 31-64
-
-
Emigh, A.1
-
16
-
-
35348818521
-
-
Technical Report CMU-ISRI- 06-112, School of Computer Science, Carnegie Mellon University
-
I. Fette, N. Sadeh and A. Tomasic, Learning to detect phishing emails, Technical Report CMU-ISRI- 06-112, School of Computer Science, Carnegie Mellon University, 2006.
-
(2006)
Learning to Detect Phishing Emails
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
17
-
-
35348913799
-
Learning to detect phishing emails
-
Banff, Canada
-
I. Fette, N. Sadeh and A. Tomasic, Learning to detect phishing emails, in: Proceedings of the International World Wide Web Conference (WWW), Banff, Canada, 2007, pp. 649-656.
-
(2007)
Proceedings of the International World Wide Web Conference (WWW)
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
18
-
-
33845807390
-
Spam filtering based on the analysis of text information embedded into images
-
G. Fumera, I. Pillai and F. Roli, Spam filtering based on the analysis of text information embedded into images, Journal of Machine Learning Research 7 (2006), 2699-2720.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2699-2720
-
-
Fumera, G.1
Pillai, I.2
Roli, F.3
-
21
-
-
71749113868
-
Spoofing and coutermeasures
-
M. Jakobsson and S. Myers, eds, Wiley
-
M. Gupta, Spoofing and coutermeasures, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 65-104.
-
(2007)
Phishing and Countermeasures
, pp. 65-104
-
-
Gupta, M.1
-
22
-
-
34250637963
-
Large-scale text categorization by batch mode active learning
-
Edinburgh, Scotland, UK
-
S.C.H. Hoi, R. Jin and M.R. Lyu, Large-scale text categorization by batch mode active learning, in: Proceedings of the 15th international conference on World Wide Web, Edinburgh, Scotland, UK, 2006, pp. 633-642.
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 633-642
-
-
Hoi, S.C.H.1
Jin, R.2
Lyu, M.R.3
-
25
-
-
84889434147
-
Making takedown difficult
-
M. Jakobsson and Steven, eds, Wiley
-
M. Jakobsson and A. Tsow, Making takedown difficult, in: Phishing and Countermeasures, M. Jakobsson and Steven, eds, Wiley, 2007, pp. 461-467.
-
(2007)
Phishing and Countermeasures
, pp. 461-467
-
-
Jakobsson, M.1
Tsow, A.2
-
26
-
-
0003650666
-
-
PhD thesis, Stanford University, CA, USA
-
G.H. John, Enhancements to the data mining process, PhD thesis, Stanford University, CA, USA, 1997.
-
(1997)
Enhancements to the Data Mining Process
-
-
John, G.H.1
-
27
-
-
0031381525
-
Wrappers for feature subset selection
-
R. Kohavi and G. John, Wrappers for feature subset selection, AI Journal 97(1,2) (1997), 273-324.
-
(1997)
AI Journal
, vol.97
, Issue.1-2
, pp. 273-324
-
-
Kohavi, R.1
John, G.2
-
28
-
-
77957922697
-
A robust front page detection algorithm for large periodical collection
-
Tampa, FL, USA
-
I. Konya, C. Seibert, S. Glahn and S. Eickeler, A robust front page detection algorithm for large periodical collection, in: Proceedings of the International Conference on Pattern Recognition (ICPR), Tampa, FL, USA, 2008, pp. 1-5.
-
(2008)
Proceedings of the International Conference on Pattern Recognition (ICPR)
, pp. 1-5
-
-
Konya, I.1
Seibert, C.2
Glahn, S.3
Eickeler, S.4
-
29
-
-
24644522810
-
On compression-based text classification
-
Santiago de Compostela, Spain
-
Y. Marton, N. Wu and L. Hellerstein, On compression-based text classification, in: Proceedings of the European Colloquium on IR Research (ECIR), Santiago de Compostela, Spain, 2005, pp. 300- 314.
-
(2005)
Proceedings of the European Colloquium on IR Research (ECIR)
, pp. 300-314
-
-
Marton, Y.1
Wu, N.2
Hellerstein, L.3
-
32
-
-
71749086755
-
-
accessed on 23.10.07
-
Mozilla, Phishing protection, 2007; http://www.mozilla.com/en-US/firefox/ phishing-protection/; accessed on 23.10.07.
-
(2007)
-
-
-
33
-
-
84889346620
-
Introduction to phishing
-
M. Jakobsson and S. Myers, eds, Wiley
-
S. Myers, Introduction to phishing, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 1-29.
-
(2007)
Phishing and Countermeasures
, pp. 1-29
-
-
Myers, S.1
-
35
-
-
84889443205
-
Microsoft's anti-phishing technologies and tactics
-
M. Jakobsson and S. Myers, eds, Wiley
-
J.L. Scarrow, Microsoft's anti-phishing technologies and tactics, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 551-562.
-
(2007)
Phishing and Countermeasures
, pp. 551-562
-
-
Scarrow, J.L.1
-
36
-
-
0002442796
-
Machine learning in automated text categorization
-
F. Sebastiani, Machine learning in automated text categorization, ACM Computing Surveys 34 (2002), 1-47.
-
(2002)
ACM Computing Surveys
, vol.34
, pp. 1-47
-
-
Sebastiani, F.1
-
37
-
-
71749091315
-
Browser-based antiphishing tools
-
M. Jakobsson and S. Myers, eds, Wiley
-
M. Stepp and C. Collberg, Browser-based antiphishing tools, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 493-513.
-
(2007)
Phishing and Countermeasures
, pp. 493-513
-
-
Stepp, M.1
Collberg, C.2
-
38
-
-
0003539213
-
-
Technical Report CMU-CS-091-197, Carnegie Mellon University, Pittsburgh, PA
-
S. Thrun et al., The MONK's problems: A performance comparison of different learning algorithms, Technical Report CMU-CS-91-197, Carnegie Mellon University, Pittsburgh, PA, 1991.
-
(1991)
The MONK's Problems: A Performance Comparison of Different Learning Algorithms
-
-
Thrun, S.1
-
40
-
-
0035680116
-
-
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) Kauai, HI, USA
-
P. Viola and M. Jones, Rapid object detection using a boosted cascade of simple features, in: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Kauai, HI, USA, 2001, pp. 511-518.
-
(2001)
Rapid object detection using a boosted cascade of simple features
, pp. 511-518
-
-
Viola, P.1
Jones, M.2
-
41
-
-
84904804970
-
Filtering image spam with near-duplicate detection
-
August 2-3 2007, Mountain View, CA, USA
-
Z. Wang, W. Josephson, Q. Lv, M. Charikar and K. Li, Filtering image spam with near-duplicate detection, in: CEAS 2007 Fourth Conference on Email and Anti-Spam, August 2-3, 2007, Mountain View, CA, USA, 2007.
-
(2007)
CEAS 2007 Fourth Conference on Email and Anti-Spam
-
-
Wang, Z.1
Josephson, W.2
Lv, Q.3
Charikar, M.4
Li, K.5
-
42
-
-
71749100304
-
Do toolbars actually prevent phishing?
-
M. Jakobsson and S. Myers, eds, Wiley
-
M. Wu, R. Miller and S. Garfinkel, Do toolbars actually prevent phishing? in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 514-521.
-
(2007)
Phishing and Countermeasures
, pp. 514-521
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
43
-
-
0014976008
-
Graph-theoretical methods for detecting and describing gestalt clusters
-
C. Zahn, Graph-theoretical methods for detecting and describing gestalt clusters, IEEE Transactions on Computers 20 (1971), 68-86.
-
(1971)
IEEE Transactions on Computers
, vol.20
, pp. 68-86
-
-
Zahn, C.1
-
44
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
Banff, Canada
-
Y. Zhang, J. Hong and L. Cranor, Cantina: A content-based approach to detecting phishing web sites, in: Proceedings of the International World Wide Web Conference (WWW), Banff, Canada, 2007, pp. 639-648.
-
(2007)
Proceedings of the International World Wide Web Conference (WWW)
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
45
-
-
51149123667
-
Automatic document logo detection
-
Curitiba, Parana, Brazil
-
G. Zhu and D. Doermann, Automatic document logo detection, in: Ninth International Conference on Document Analysis and Recognition, 2007, Curitiba, Parana, Brazil, Vol.2, 2007, pp. 864-868.
-
(2007)
Ninth International Conference on Document Analysis and Recognition 2007
, vol.2
, pp. 864-868
-
-
Zhu, G.1
Doermann, D.2
|