-
2
-
-
34548344520
-
-
Anti-Phishing Working Group, September 2007
-
Anti-Phishing Working Group. Phishing Activity Trends Report, http://antiphishing.org/reports/apwg-report-sep2007-final.pdf. September 2007.
-
Phishing Activity Trends Report
-
-
-
4
-
-
3042514639
-
fuzzy data mining and genetic algorithms applied to intrusion detection
-
Department of Computer Science Mississippi State University, White Paper
-
S. M. Bridges and R. B. Vaughn, "fuzzy data mining and genetic algorithms applied to intrusion detection," Department of Computer Science Mississippi State University, White Paper, 2001.
-
(2001)
-
-
Bridges, S.M.1
Vaughn, R.B.2
-
7
-
-
33751538239
-
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
-
A. Y. Fu, L. Wenyin and X. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)," IEEE transactions on dependable and secure computing, vol. 3, no. 4, 2006.
-
(2006)
IEEE transactions on dependable and secure computing
, vol.3
, Issue.4
-
-
Fu, A.Y.1
Wenyin, L.2
Deng, X.3
-
8
-
-
49149087472
-
Protecting Naive Web Users
-
Draft of July 18
-
A. Herzberg and A. Gbara, "Protecting Naive Web Users," Draft of July 18, 2004.
-
(2004)
-
-
Herzberg, A.1
Gbara, A.2
-
9
-
-
33750395096
-
Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma-Delta Modulators
-
Regular Papers, October
-
C. Y. Ho, B. W. Ling and J. D. Reiss, "Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma-Delta Modulators," IEEE Transactions on Circuits and Systems-I: Regular Papers, Vol. 53, No. 10, October 2006.
-
(2006)
IEEE Transactions on Circuits and Systems-I
, vol.53
, Issue.10
-
-
Ho, C.Y.1
Ling, B.W.2
Reiss, J.D.3
-
10
-
-
85167754239
-
Phishing Exposed
-
Tech Target Article sponsored by: Sunbelt software, searchexchange.com
-
L. James, "Phishing Exposed," Tech Target Article sponsored by: Sunbelt software, searchexchange.com, 2006.
-
(2006)
-
-
James, L.1
-
11
-
-
0036929243
-
The continuity of Mamdani method
-
Pages
-
M. Liu, D. Chen and C. Wu., "The continuity of Mamdani method," International Conference on Machine Learning and Cybernetics, Page(s): 1680-1682 vol.3, 2002.
-
(2002)
International Conference on Machine Learning and Cybernetics
, vol.3
, pp. 1680-1682
-
-
Liu, M.1
Chen, D.2
Wu, C.3
-
12
-
-
33645115367
-
Phishing Web Page Detection
-
W. Liu, G. Huang, X. Liu, M. Zhang, and X. Deng, "Phishing Web Page Detection," Proc. Eighth Int'l Conf. Documents Analysis and Recognition, pp. 560-564, 2005.
-
(2005)
Proc. Eighth Int'l Conf. Documents Analysis and Recognition
, pp. 560-564
-
-
Liu, W.1
Huang, G.2
Liu, X.3
Zhang, M.4
Deng, X.5
-
13
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
Published by the
-
W. Liu, X. Deng, G. Huang and A. Y. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment," Published by the IEEE Computer Society 1089-7801/06 IEEE, INTERNET COMPUTING IEEE, 2006.
-
(2006)
IEEE Computer Society 1089-7801/06 IEEE, INTERNET COMPUTING IEEE
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
15
-
-
49149087981
-
AOL tests caller ID for e-mail
-
CNET News.com, January 22
-
S. Olsen, "AOL tests caller ID for e-mail," CNET News.com, January 22, 2004.
-
(2004)
-
-
Olsen, S.1
-
17
-
-
49149101751
-
Yahoo airs antispam initiative
-
ComputerWeekly.com, December 8
-
J. C. Perez, "Yahoo airs antispam initiative," ComputerWeekly.com, December 8, 2003.
-
(2003)
-
-
Perez, J.C.1
-
19
-
-
33745861599
-
-
September 9, 2006
-
T. Sharif, "Phishing Filter in IE7," http://blogs.msdn.com/ie/ archive/2005/09/09/463204.aspx, September 9, 2006.
-
Phishing Filter in IE7
-
-
Sharif, T.1
-
21
-
-
33745867321
-
Do Security Toolbars Actually Prevent Phishing Attacks?
-
April
-
M. Wu, R. C. Miller and S. L. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?," CHI April 2006.
-
(2006)
CHI
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
23
-
-
72349100599
-
Exploring Phishing Attacks and Countermeasures
-
Master Thesis in Computer Science, Thesis No:, September
-
Anders Persson, "Exploring Phishing Attacks and Countermeasures", Master Thesis in Computer Science, Thesis No: MCS-2007:18, September 2007.
-
(2007)
, vol.MCS-2007
, pp. 18
-
-
Persson, A.1
-
25
-
-
72349097035
-
-
Putting an end to account-hijacking identity theft, FDIC, Tech. Rep., Dec. 2004. [Online]. Available: http://www.fdic.gov/consumers/ consumer/idtheftstudy/identitytheft.pdf.
-
"Putting an end to account-hijacking identity theft," FDIC, Tech. Rep., Dec. 2004. [Online]. Available: http://www.fdic.gov/consumers/ consumer/idtheftstudy/identitytheft.pdf.
-
-
-
-
27
-
-
72349083000
-
-
WEKA - University of Waikato, New Zealand, EN, 2006: Weka - Data Mining with Open Source Machine Learning Software in Java; http://www.cs.waikato.ac.nz/ml/weka (2006/01/31).
-
WEKA - University of Waikato, New Zealand, EN, 2006: "Weka - Data Mining with Open Source Machine Learning Software in Java"; http://www.cs.waikato.ac.nz/ml/weka (2006/01/31).
-
-
-
-
28
-
-
72349098152
-
-
Sebastian Misch, Content Negotiatio in Internet Mail, Diploma Thesis, University of Applied Sciences Cologne, Mat.No.: 7042524, February 2006.
-
Sebastian Misch, "Content Negotiatio in Internet Mail", Diploma Thesis, University of Applied Sciences Cologne, Mat.No.: 7042524, February 2006.
-
-
-
-
30
-
-
72349090889
-
-
Lyman, Peter; Hal R. Varian (2003). How Much Information. http://www.sims.berkeley.edu/how-much-info-2003. Retrieved on 2008-12-17.
-
Lyman, Peter; Hal R. Varian (2003). "How Much Information". http://www.sims.berkeley.edu/how-much-info-2003. Retrieved on 2008-12-17.
-
-
-
-
31
-
-
72349095778
-
-
Kantardzic and Mehmed. Data Mining: Concepts, Models, Methods, and Algorithms., John Wiley & Sons. ISBN 0471228524. OCLC 50055336, 2003.
-
Kantardzic and Mehmed. "Data Mining: Concepts, Models, Methods, and Algorithms.", John Wiley & Sons. ISBN 0471228524. OCLC 50055336, 2003.
-
-
-
-
32
-
-
0003280548
-
Mining Databases: Towards Algorithms for Knowledge Discovery
-
U.M. Fayyad, "Mining Databases: Towards Algorithms for Knowledge Discovery," Data Eng. Bull., vol. 21, no. 1, pp. 39-48, 1998.
-
(1998)
Data Eng. Bull
, vol.21
, Issue.1
, pp. 39-48
-
-
Fayyad, U.M.1
-
33
-
-
84948104699
-
Integrating Classification and Association Rule Mining
-
New York, USA
-
Bing Liu, Wynne Hsu, Yiming Ma, "Integrating Classification and Association Rule Mining." Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98, Plenary Presentation), New York, USA, 1998.
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98, Plenary Presentation)
-
-
Liu, B.1
Hsu, W.2
Ma, Y.3
-
34
-
-
0003957032
-
-
2nd Edition, Morgan Kaufmann, San Francisco, CA
-
I.H. Witten, E. Frank, Data Mining: Practical machine learning tools and techniques, 2nd Edition, Morgan Kaufmann, San Francisco, CA, 2005.
-
(2005)
Data Mining: Practical machine learning tools and techniques
-
-
Witten, I.H.1
Frank, E.2
-
35
-
-
0024103809
-
PRISM: An algorithm for inducing modular rule
-
J. Cendrowska. "PRISM: An algorithm for inducing modular rule", International Journal of Man-Machine Studies (1987), Vol.27, No.4, pp.349-370.
-
(1987)
International Journal of Man-Machine Studies
, vol.27
, Issue.4
, pp. 349-370
-
-
Cendrowska, J.1
-
37
-
-
0001882616
-
Fast algorithms for mining association rules in large databases
-
Santiage, Chile: Morgan Kaufmann, Los Altos, CA
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules in large databases", Proc International Conference on Very Large Databases, pp. 478-499. Santiage, Chile: Morgan Kaufmann, Los Altos, CA, 1994.
-
(1994)
Proc International Conference on Very Large Databases
, pp. 478-499
-
-
Agrawal, R.1
Srikant, R.2
-
39
-
-
72349090016
-
-
http://www.phishtank.com/phish-archive.php
-
-
-
-
40
-
-
84962671851
-
Centroid-Based Document Classification: Analysis and Experimental Results
-
p
-
E. Han and G. Karypis, "Centroid-Based Document Classification: Analysis and Experimental Results, Principles of Data Mining and Knowledge Discovery", p. 424-431, 2000.
-
(2000)
Principles of Data Mining and Knowledge Discovery
, pp. 424-431
-
-
Han, E.1
Karypis, G.2
-
42
-
-
19544382863
-
A new multi-class,multi-label associative classification approach
-
Brighton, UK
-
F.Thabtah, P. Cowling and Y. Peng, "A new multi-class,multi-label associative classification approach". The 4th International Conference on Data Mining(ICDM'04), Brighton, UK, 2004.
-
(2004)
The 4th International Conference on Data Mining(ICDM'04)
-
-
Thabtah, F.1
Cowling, P.2
Peng, Y.3
-
43
-
-
72349084932
-
-
April 2004
-
Microsoft, "http://www.microsoft.com/mscorp/twc/privacy/spam", April 2004.
-
-
-
-
44
-
-
72349094067
-
-
Dec 2004
-
Netcraft, "http://toolbar.netcraft.com/", Dec 2004.
-
-
-
|