메뉴 건너뛰기




Volumn , Issue , 2009, Pages 488-492

Using differencing to increase distinctiveness for phishing website clustering

Author keywords

[No Author keywords available]

Indexed keywords

CONFIDENTIAL DATA; DATA SETS; DIFFERENT ATTACKS; PHISHING; PHISHING ATTACKS; REDUCED DIMENSIONALITY; WEB PAGE;

EID: 72849152291     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UIC-ATC.2009.62     Document Type: Conference Paper
Times cited : (13)

References (9)
  • 2
    • 0005044188 scopus 로고
    • Profiling: A hidden challenge to the regulation of data surveillance
    • R. Clarke. Profiling: A hidden challenge to the regulation of data surveillance. Journal of Law and Information Science, 4:403, 1993.
    • (1993) Journal of Law and Information Science , vol.4 , pp. 403
    • Clarke, R.1
  • 3
    • 72849142804 scopus 로고    scopus 로고
    • F. T. Commission. Identity theft survey report. Technical report, www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf., 2007.
    • F. T. Commission. Identity theft survey report. Technical report, www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf., 2007.
  • 6
    • 72849108260 scopus 로고    scopus 로고
    • J. Hunt, M. McIlroy, and B. T. Laboratories. An Algorithm for Differential File Comparison. Bell Laboratories, 1976.
    • J. Hunt, M. McIlroy, and B. T. Laboratories. An Algorithm for Differential File Comparison. Bell Laboratories, 1976.
  • 8
    • 72849126345 scopus 로고    scopus 로고
    • Determining provenance of phishing websites using automated conceptual analysis
    • submitted
    • R. Layton and P. Watters. Determining provenance of phishing websites using automated conceptual analysis. submitted, 2009.
    • (2009)
    • Layton, R.1    Watters, P.2
  • 9
    • 58049158943 scopus 로고    scopus 로고
    • Forensic characteristics of phishing - petty theft or organized crime?
    • J. Cordeiro, J. Filipe, and S. Hammoudi, editors, INSTICC Press
    • S. McCombie, P. Watters, A. Ng, and B. Watson. Forensic characteristics of phishing - petty theft or organized crime? In J. Cordeiro, J. Filipe, and S. Hammoudi, editors, WEBIST (1), pages 149-157. INSTICC Press, 2008.
    • (2008) WEBIST (1) , pp. 149-157
    • McCombie, S.1    Watters, P.2    Ng, A.3    Watson, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.