-
1
-
-
72449167296
-
A Comparison of Machine Learning Techniques for Phishing Detection
-
Pittsburgh, USA
-
Abu-Nimeh, S., Nappa, D., Wang, X., & Nair, S. A Comparison of Machine Learning Techniques for Phishing Detection, in Proceedings of the APWG eCrime Researchers Summit, Pittsburgh, USA, 2007.
-
(2007)
Proceedings of the APWG eCrime Researchers Summit
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
2
-
-
72449186444
-
-
The Anti-Phishing Work Group, Last accessed June 2009
-
The Anti-Phishing Work Group, http://www.apwg.org/, Last accessed June 2009.
-
-
-
-
3
-
-
72449173241
-
-
nd Half 2008, Available at http://www.apwg.org/reports/apwg- report-H2-2008.pdf, 2009.
-
nd Half 2008, Available at http://www.apwg.org/reports/apwg- report-H2-2008.pdf, 2009.
-
-
-
-
4
-
-
72449149043
-
-
Bergholz, A., De Beer, J., Glahn, S., Moens, M-F., Paaß, G. & Strobel, S. New Filtering Approaches for Phishing Email, to appear in the Journal of Computer Security, 2009.
-
(2009)
New Filtering Approaches for Phishing Email, to appear in the Journal of Computer Security
-
-
Bergholz, A.1
De Beer, J.2
Glahn, S.3
Moens, M.-F.4
Paaß, G.5
Strobel, S.6
-
5
-
-
34249753618
-
-
Cortes, C. & Vapnik, V. Support Vector Networks in Machine Learning, 20, pp. 273-297, 1995.
-
Cortes, C. & Vapnik, V. Support Vector Networks in Machine Learning, Vol. 20, pp. 273-297, 1995.
-
-
-
-
6
-
-
72449187386
-
-
Cyveillance Report, The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks, available at http://www.apwg.org/sponsors- technical-papers/, October 2008.
-
Cyveillance Report, The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks, available at http://www.apwg.org/sponsors- technical-papers/, October 2008.
-
-
-
-
8
-
-
35348818521
-
-
Technical Report, Institute for Software Research International, School of Computer Science, Carneige Mellon University
-
Fette, I., Sadeh, N., & Tomasic, A. Learning to Detect Phishing Emails, Technical Report, Institute for Software Research International, School of Computer Science, Carneige Mellon University, 2006.
-
(2006)
Learning to Detect Phishing Emails
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
9
-
-
0003425660
-
Text Categorization for Support Vector Machines
-
Technical Report, LS VIII, Number 23, University of Dortmund
-
Joachims, T. Text Categorization for Support Vector Machines Technical Report, LS VIII, Number 23, University of Dortmund, 1997.
-
(1997)
-
-
Joachims, T.1
-
10
-
-
0037403516
-
-
Kuncheva, L. I., & Whitaker, C. J. Measures of Diversity in Classifier Ensembles, in Machine Learning, 51, pp. 181 - 207, 2003.
-
Kuncheva, L. I., & Whitaker, C. J. Measures of Diversity in Classifier Ensembles, in Machine Learning, Vol. 51, pp. 181 - 207, 2003.
-
-
-
-
12
-
-
72449171375
-
-
Last accessed June 2009
-
Nazario, J. Phishing Corpus, From http://www.monkey.org/jose/wiki/doku. php?id=phishingcorpus. Last accessed June 2009.
-
Phishing Corpus, From http
-
-
Nazario, J.1
-
13
-
-
72449138418
-
-
Quinlan, J. R. C4.5: Programs for Machine Learning, MorganKaufmann Publishers 1993.
-
Quinlan, J. R. C4.5: Programs for Machine Learning, MorganKaufmann Publishers 1993.
-
-
-
-
14
-
-
72449140395
-
-
available at, Last accessed June 2009
-
Quinlan, J. R. Is See5/C5.0 Better Than C4.5?, available at http://www.rulequest.com/see5-comparison.html. Last accessed June 2009.
-
Is See5/C5.0 Better Than C4.5
-
-
Quinlan, J.R.1
-
16
-
-
59249089053
-
iTrustPage: A User-Assisted Anti-Phishing Tool
-
Glasgow, Scotland
-
Ronda, T., Saroiu, S., & Wolman, A. iTrustPage: A User-Assisted Anti-Phishing Tool, in Proceedings of EuroSys 2008, Glasgow, Scotland, 2008.
-
(2008)
Proceedings of EuroSys
-
-
Ronda, T.1
Saroiu, S.2
Wolman, A.3
-
17
-
-
60649113812
-
Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish
-
Pittsburgh, PA, July
-
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J., & Nunge, E. Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish in Proceedings of the 2007 Symposium on Usable Privacy and Security, Pittsburgh, PA, July, 2007.
-
(2007)
Proceedings of the 2007 Symposium on Usable Privacy and Security
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.5
Hong, J.6
Nunge, E.7
-
18
-
-
84881051034
-
-
Spam Assassin Project, Last Accessed June 2009
-
Spam Assassin Project, Ham Email Corpus, http://spamassassin.apache.org/ publiccorpus/. Last Accessed June 2009.
-
Ham Email Corpus
-
-
-
21
-
-
33645115367
-
-
th International Conference on Document Analysis and Recognition, 2005.
-
th International Conference on Document Analysis and Recognition, 2005.
-
-
-
|