-
1
-
-
0032090765
-
Automatic subspace clustering of high dimensional data for data mining applications
-
Seattle, WA, June, ACM Press
-
R. Agrawal, J. Gehrke, D. Gunopulos, and P. Raghavan. Automatic subspace clustering of high dimensional data for data mining applications. In Proceedings ACM SIGMOD International Conference on Management of Data, pages 94-105, Seattle, WA, June 1998. ACM Press.
-
(1998)
Proceedings ACM SIGMOD International Conference on Management of Data
, pp. 94-105
-
-
Agrawal, R.1
Gehrke, J.2
Gunopulos, D.3
Raghavan, P.4
-
3
-
-
84947205653
-
When is 'nearest neighbor' meaningful?
-
K. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft. When is 'nearest neighbor' meaningful? LECTURE NOTES IN COMPUTER SCIENCE, pages 217-235, 1999.
-
(1999)
LECTURE NOTES IN COMPUTER SCIENCE
, pp. 217-235
-
-
Beyer, K.1
Goldstein, J.2
Ramakrishnan, R.3
Shaft, U.4
-
4
-
-
0005044188
-
Profiling: A hidden challenge to the regulation of data surveillance
-
R. Clarke. Profiling: A hidden challenge to the regulation of data surveillance. Journal of Law and Information Science, 4:403, 1993.
-
(1993)
Journal of Law and Information Science
, vol.4
, pp. 403
-
-
Clarke, R.1
-
5
-
-
72449134660
-
-
F. T. Commission. Identity theft survey report. Technical report, www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf., 2007.
-
F. T. Commission. Identity theft survey report. Technical report, www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf., 2007.
-
-
-
-
6
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590, New York, NY, USA, 2006. ACM.
-
(2006)
CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
7
-
-
72449128919
-
-
H. S. A. H. Dinna N. M. N., Leau Y. B. and Y. A. S. Managing legal, consumers and commerce risks in phishing. In WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, 26, 2007.
-
H. S. A. H. Dinna N. M. N., Leau Y. B. and Y. A. S. Managing legal, consumers and commerce risks in phishing. In WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, volume 26, 2007.
-
-
-
-
8
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
Portland, OR, AAAI Press
-
M. Ester, H. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining, Portland, OR, AAAI Press, pages 226-231, 1996.
-
(1996)
Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.2
Sander, J.3
Xu, X.4
-
16
-
-
58049158943
-
Forensic characteristics of phishing - petty theft or organized crime?
-
J. Cordeiro, J. Filipe, and S. Hammoudi, editors, INSTICC Press
-
S. McCombie, P. Watters, A. Ng, and B. Watson. Forensic characteristics of phishing - petty theft or organized crime? In J. Cordeiro, J. Filipe, and S. Hammoudi, editors, WEBIST (1), pages 149-157. INSTICC Press, 2008.
-
(2008)
WEBIST (1)
, pp. 149-157
-
-
McCombie, S.1
Watters, P.2
Ng, A.3
Watson, B.4
-
17
-
-
72449169245
-
-
J. Milletary and C. Center. Technical trends in phishing attacks. US-CERT, Tech. Rep, 2005.
-
J. Milletary and C. Center. Technical trends in phishing attacks. US-CERT, Tech. Rep, 2005.
-
-
-
-
18
-
-
17044376078
-
Subspace clustering for high dimensional data: A review
-
L. Parsons, E. Haque, and H. Liu. Subspace clustering for high dimensional data: a review. ACM SIGKDD Explorations Newsletter, 6(1):90-105, 2004.
-
(2004)
ACM SIGKDD Explorations Newsletter
, vol.6
, Issue.1
, pp. 90-105
-
-
Parsons, L.1
Haque, E.2
Liu, H.3
-
19
-
-
34547633089
-
Mining blog stories using community-based and temporal clustering
-
New York, NY, USA, ACM
-
A. Qamra, B. Tseng, and E. Y. Chang. Mining blog stories using community-based and temporal clustering. In CIKM '06: Proceedings of the 15th ACM international conference on Information and knowledge management, pages 58-67, New York, NY, USA, 2006. ACM.
-
(2006)
CIKM '06: Proceedings of the 15th ACM international conference on Information and knowledge management
, pp. 58-67
-
-
Qamra, A.1
Tseng, B.2
Chang, E.Y.3
-
20
-
-
72449126933
-
Phishscope: Tracking phish server clusters
-
July
-
J. S. Quarterman. Phishscope: Tracking phish server clusters. Journal of Digital Forensic Practice, 1(2):103-114, July 2006.
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, Issue.2
, pp. 103-114
-
-
Quarterman, J.S.1
-
21
-
-
59249089053
-
Itrustpage: A user-assisted anti-phishing tool
-
ACM New York, NY, USA
-
T. Ronda, S. Saroiu, and A. Wolman. Itrustpage: a user-assisted anti-phishing tool. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, pages 261-272. ACM New York, NY, USA, 2008.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 261-272
-
-
Ronda, T.1
Saroiu, S.2
Wolman, A.3
-
22
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics, 20(1):53-65, 1987.
-
(1987)
Journal of computational and applied mathematics
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.1
-
24
-
-
72449199309
-
Genres in formation? an exploratory study of web pages using cluster analysis
-
M. Santini. Genres in formation? an exploratory study of web pages using cluster analysis. Proc. CLUK, 5, 2005.
-
(2005)
Proc. CLUK
, vol.5
-
-
Santini, M.1
-
25
-
-
56749156896
-
Mining spam email to identify common origins for forensic application
-
New York, NY, USA, ACM
-
C. Wei, A. Sprague, G. Warner, and A. Skjellum. Mining spam email to identify common origins for forensic application. In SAC '08: Proceedings of the 2008 ACM symposium on Applied computing, pages 1433-1437, New York, NY, USA, 2008. ACM.
-
(2008)
SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
, pp. 1433-1437
-
-
Wei, C.1
Sprague, A.2
Warner, G.3
Skjellum, A.4
-
27
-
-
8644273327
-
Learning to cluster web search results
-
New York, NY, USA, ACM
-
H.-J. Zeng, Q.-C. He, Z. Chen, W.-Y. Ma, and J. Ma. Learning to cluster web search results. In SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, pages 210-217, New York, NY, USA, 2004. ACM.
-
(2004)
SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval
, pp. 210-217
-
-
Zeng, H.-J.1
He, Q.-C.2
Chen, Z.3
Ma, W.-Y.4
Ma, J.5
|