메뉴 건너뛰기




Volumn 18, Issue 1, 2010, Pages 7-35

New filtering approaches for phishing email

Author keywords

Email filtering; Phishing; Text mining

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION SECURITY; CONFIDENTIAL INFORMATION; CONTENT BASED FILTERING; CONTENT-BASED; EMAIL FILTERING; EMPIRICAL EVALUATIONS; FINANCIAL INSTITUTION; GLOBAL SECURITY; PHISHING; PRIVATE INFORMATION; SEQUENTIAL ANALYSIS; STATISTICAL CLASSIFIER; STATISTICAL MODELS; TEXT MINING; TRAINING SETS;

EID: 71749098791     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0371     Document Type: Article
Times cited : (123)

References (45)
  • 3
    • 71749083476 scopus 로고    scopus 로고
    • accessed on 25.01.08
    • Bank Austria, Faq mobile TAN, 2008; http://www.bankaustria.at/de/19825. html, accessed on 25.01.08.
    • (2008) Faq Mobile TAN
  • 8
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, Random forests, Machine Learning 45(1) (2001), 5-32.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 9
    • 84904818217 scopus 로고    scopus 로고
    • A discriminative classifier learning approach to image modeling and spam image identification
    • August 2-3 2007, Mountain View, CA, USA
    • B. Byun, C.-H. Lee, S. Webb and C. Pu, A discriminative classifier learning approach to image modeling and spam image identification, in: CEAS 2007 Fourth Conference on Email and Anti- Spam, August 2-3, 2007, Mountain View, CA, USA, 2007.
    • (2007) CEAS 2007 Fourth Conference on Email and Anti-Spam
    • Byun, B.1    Lee, C.-H.2    Webb, S.3    Pu, C.4
  • 12
    • 71749100953 scopus 로고    scopus 로고
    • accessed on 11.05.08
    • Commtouch, Commtouch q3 spam statistics: Spam problem reaches new peak, expands in every dimension, 2008; http://www.commtouch.com/Site/News-Events/pr- content.asp?news-id=767&cat-id=1, accessed on 11.05.08.
    • (2008) Spam Problem Reaches New Peak, Expands in Every Dimension
  • 13
    • 0023536787 scopus 로고
    • Data compression using dynamic Markov modelling
    • G.V. Cormack and R.N. Horspool, Data compression using dynamic Markov modelling, The Computer Journal 30(6) (1987), 541-550.
    • (1987) The Computer Journal , vol.30 , Issue.6 , pp. 541-550
    • Cormack, G.V.1    Horspool, R.N.2
  • 15
    • 84889328778 scopus 로고    scopus 로고
    • Phishing attacks: Information flow and chokepoints
    • M. Jakobsson and S. Myers, eds, Wiley
    • A. Emigh, Phishing attacks: Information flow and chokepoints, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 31-64.
    • (2007) Phishing and Countermeasures , pp. 31-64
    • Emigh, A.1
  • 16
    • 35348818521 scopus 로고    scopus 로고
    • Technical Report CMU-ISRI- 06-112, School of Computer Science, Carnegie Mellon University
    • I. Fette, N. Sadeh and A. Tomasic, Learning to detect phishing emails, Technical Report CMU-ISRI- 06-112, School of Computer Science, Carnegie Mellon University, 2006.
    • (2006) Learning to Detect Phishing Emails
    • Fette, I.1    Sadeh, N.2    Tomasic, A.3
  • 18
    • 33845807390 scopus 로고    scopus 로고
    • Spam filtering based on the analysis of text information embedded into images
    • G. Fumera, I. Pillai and F. Roli, Spam filtering based on the analysis of text information embedded into images, Journal of Machine Learning Research 7 (2006), 2699-2720.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2699-2720
    • Fumera, G.1    Pillai, I.2    Roli, F.3
  • 21
    • 71749113868 scopus 로고    scopus 로고
    • Spoofing and coutermeasures
    • M. Jakobsson and S. Myers, eds, Wiley
    • M. Gupta, Spoofing and coutermeasures, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 65-104.
    • (2007) Phishing and Countermeasures , pp. 65-104
    • Gupta, M.1
  • 25
    • 84889434147 scopus 로고    scopus 로고
    • Making takedown difficult
    • M. Jakobsson and Steven, eds, Wiley
    • M. Jakobsson and A. Tsow, Making takedown difficult, in: Phishing and Countermeasures, M. Jakobsson and Steven, eds, Wiley, 2007, pp. 461-467.
    • (2007) Phishing and Countermeasures , pp. 461-467
    • Jakobsson, M.1    Tsow, A.2
  • 27
    • 0031381525 scopus 로고    scopus 로고
    • Wrappers for feature subset selection
    • R. Kohavi and G. John, Wrappers for feature subset selection, AI Journal 97(1,2) (1997), 273-324.
    • (1997) AI Journal , vol.97 , Issue.1-2 , pp. 273-324
    • Kohavi, R.1    John, G.2
  • 32
    • 71749086755 scopus 로고    scopus 로고
    • accessed on 23.10.07
    • Mozilla, Phishing protection, 2007; http://www.mozilla.com/en-US/firefox/ phishing-protection/; accessed on 23.10.07.
    • (2007)
  • 33
    • 84889346620 scopus 로고    scopus 로고
    • Introduction to phishing
    • M. Jakobsson and S. Myers, eds, Wiley
    • S. Myers, Introduction to phishing, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 1-29.
    • (2007) Phishing and Countermeasures , pp. 1-29
    • Myers, S.1
  • 35
    • 84889443205 scopus 로고    scopus 로고
    • Microsoft's anti-phishing technologies and tactics
    • M. Jakobsson and S. Myers, eds, Wiley
    • J.L. Scarrow, Microsoft's anti-phishing technologies and tactics, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 551-562.
    • (2007) Phishing and Countermeasures , pp. 551-562
    • Scarrow, J.L.1
  • 36
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • F. Sebastiani, Machine learning in automated text categorization, ACM Computing Surveys 34 (2002), 1-47.
    • (2002) ACM Computing Surveys , vol.34 , pp. 1-47
    • Sebastiani, F.1
  • 37
    • 71749091315 scopus 로고    scopus 로고
    • Browser-based antiphishing tools
    • M. Jakobsson and S. Myers, eds, Wiley
    • M. Stepp and C. Collberg, Browser-based antiphishing tools, in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 493-513.
    • (2007) Phishing and Countermeasures , pp. 493-513
    • Stepp, M.1    Collberg, C.2
  • 40
    • 0035680116 scopus 로고    scopus 로고
    • Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) Kauai, HI, USA
    • P. Viola and M. Jones, Rapid object detection using a boosted cascade of simple features, in: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Kauai, HI, USA, 2001, pp. 511-518.
    • (2001) Rapid object detection using a boosted cascade of simple features , pp. 511-518
    • Viola, P.1    Jones, M.2
  • 42
    • 71749100304 scopus 로고    scopus 로고
    • Do toolbars actually prevent phishing?
    • M. Jakobsson and S. Myers, eds, Wiley
    • M. Wu, R. Miller and S. Garfinkel, Do toolbars actually prevent phishing? in: Phishing and Countermeasures, M. Jakobsson and S. Myers, eds, Wiley, 2007, pp. 514-521.
    • (2007) Phishing and Countermeasures , pp. 514-521
    • Wu, M.1    Miller, R.2    Garfinkel, S.3
  • 43
    • 0014976008 scopus 로고
    • Graph-theoretical methods for detecting and describing gestalt clusters
    • C. Zahn, Graph-theoretical methods for detecting and describing gestalt clusters, IEEE Transactions on Computers 20 (1971), 68-86.
    • (1971) IEEE Transactions on Computers , vol.20 , pp. 68-86
    • Zahn, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.