-
1
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
Ahmed Abbasi and Hsinchun Chen. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst., 26(2):1-29, 2008.
-
(2008)
ACM Trans. Inf. Syst
, vol.26
, Issue.2
, pp. 1-29
-
-
Abbasi, A.1
Chen, H.2
-
3
-
-
26844576391
-
A new nonsmooth optimization algorithm for minimum sum-of-squares clustering problems
-
Adil M. Bagirow and John Yearwood. A new nonsmooth optimization algorithm for minimum sum-of-squares clustering problems. European Journal of Operatioanl Research, 170:578-596, 2006.
-
(2006)
European Journal of Operatioanl Research
, vol.170
, pp. 578-596
-
-
Bagirow, A.M.1
Yearwood, J.2
-
6
-
-
72449145674
-
-
Technical report
-
D. Boneh. Spoofguard. Technical report, http://crypto.stanford.edu/ SpoofGuard/.
-
-
-
Boneh, D.1
Spoofguard2
-
11
-
-
6344251104
-
Text clustering based on background knowledge
-
Technical report, University of Karlsrube, Institute AIFB
-
A. Hotho, S.Staab, and G. Stumme. Text clustering based on background knowledge. Technical report, University of Karlsrube, Institute AIFB, 2003.
-
(2003)
-
-
Hotho, A.1
Staab, S.2
Stumme, G.3
-
12
-
-
72449166808
-
-
working group
-
http://www.antiphishing.org/. Anti-phishing working group.
-
-
-
-
13
-
-
72449185046
-
-
http://www.apwg.org/reports/APWG-GlobalPhishingSurvey2H2008.pdf. Global phishing survey: Trends and domain name used in 2h2008, May 2009.
-
http://www.apwg.org/reports/APWG-GlobalPhishingSurvey2H2008.pdf. Global phishing survey: Trends and domain name used in 2h2008, May 2009.
-
-
-
-
14
-
-
72449156462
-
-
http://www.gartner.com/it/page.jsp?id=565125. Agartner.
-
-
-
-
15
-
-
33750311278
-
Text clustering with extended user feedback
-
Seattle, USA, August, ACM Press, NY, USA
-
Yifen Huang and Tom M. Mitchell. Text clustering with extended user feedback. In Proceedings of International Conference on Information Retrieval, SIGIR'06, pages 413-420, Seattle, USA, August 2006. ACM Press, NY, USA.
-
(2006)
Proceedings of International Conference on Information Retrieval, SIGIR'06
, pp. 413-420
-
-
Huang, Y.1
Mitchell, T.M.2
-
16
-
-
33750295383
-
Document clustering with prior knowledge full text
-
Seattle, USA, August, ACM Press, NY, USA
-
Xiang Ji and Wei Xu. Document clustering with prior knowledge full text. In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pages 405 - 412, Seattle, USA, August 2006. ACM Press, NY, USA.
-
(2006)
Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
, pp. 405-412
-
-
Ji, X.1
Xu, W.2
-
17
-
-
0001938951
-
Transductive inference for text classification using support vector machine
-
T. Joachims. Transductive inference for text classification using support vector machine. In Proceeding of ICML-99, 1999.
-
(1999)
Proceeding of ICML-99
-
-
Joachims, T.1
-
18
-
-
72449181200
-
Protecting users against phishing attacks
-
Engin Kirda and Christopher Kruegel. Protecting users against phishing attacks. The Computer Journal, 2005.
-
(2005)
The Computer Journal
-
-
Kirda, E.1
Kruegel, C.2
-
22
-
-
72849117349
-
Detecting phishing emails using hybrid features
-
Brisbane, Australia
-
Liping Ma, Bahadorrezda Ofoghi, Paul Watters, and Simon Brown. Detecting phishing emails using hybrid features. In Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009), Brisbane, Australia, 2009.
-
(2009)
Proceedings of the Cybercrime and Trustworthy Computing Workshop (CTC-2009)
-
-
Ma, L.1
Ofoghi, B.2
Watters, P.3
Brown, S.4
-
23
-
-
58049158943
-
Forensic characteristics of phishing - petty theft or organized crime?
-
Stephen McCombie, Paul Watters, Alex Ng, and Brett Watson. Forensic characteristics of phishing - petty theft or organized crime? In WEBIST, pages 149-157, 2008.
-
(2008)
WEBIST
, pp. 149-157
-
-
McCombie, S.1
Watters, P.2
Ng, A.3
Watson, B.4
-
25
-
-
25144524330
-
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. A browser plug-in solution to the unique password problem, 2005.
-
(2005)
A browser plug-in solution to the unique password problem
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
26
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Baltimore, MD, USA
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In 14th Usenix Security Symposium, Baltimore, MD, USA, 2005.
-
(2005)
14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
28
-
-
0002442796
-
Machine learning in automated text categorization
-
Fabrizio Sebastiani. Machine learning in automated text categorization. ACM Computing Surveys, 34(1):1-47, 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
29
-
-
72449210897
-
-
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min, and Xiaotie Deng. Detection of phishing webpages based on visual similarity
-
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min, and Xiaotie Deng. Detection of phishing webpages based on visual similarity.
-
-
-
|