-
1
-
-
79952049092
-
DNS cache poisoning - The next generation
-
J. Stewart, "DNS cache poisoning - the next generation, " Secure Works, Tech. Rep., 2003, http://www.secureworks.com/research/articles/.
-
(2003)
Secure Works, Tech. Rep.
-
-
Stewart, J.1
-
2
-
-
33748985945
-
Online identity theft: Phishing technilogy, chokepoints and countermeasures
-
retrieved from
-
A. Emigh, "Online identity theft: Phishing technilogy, chokepoints and countermeasures, " Radix Labs, Tech. Rep., 2005, retrieved from Anti- Phishing Working Group: http://www.antiphishing.org/resources.html.
-
(2005)
Radix Labs, Tech. Rep.
-
-
Emigh, A.1
-
3
-
-
35348913799
-
Learning to detect phishing emails
-
New York, NY, USA: ACM Press
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails, " in WWW '07: Proceedings of the 16th international conference on the World Wide Web. New York, NY, USA: ACM Press, 2007, pp. 649-656.
-
(2007)
WWW'07: Proceedings of the 16th International Conference on the World Wide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
5
-
-
33751030004
-
Cache cookies for browser authentication (extended abstract)
-
Washington, DC, USA: IEEE Computer Society
-
A. Juels, M. Jakobsson, and T. N. Jagatic, "Cache cookies for browser authentication (extended abstract), " in SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06). Washington, DC, USA: IEEE Computer Society, 2006, pp. 301-305.
-
(2006)
SP'06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06).
, pp. 301-305
-
-
Juels, A.1
Jakobsson, M.2
Jagatic, T.N.3
-
7
-
-
84870548992
-
Prototyping a lightweight trust architecture to fight phishing
-
May, final Report
-
D. Chau, "Prototyping a lightweight trust architecture to fight phishing, " MIT ComputerScience And Artificial Intelligence Laboratory, Tech. Rep., May 2005, final Report, http://groups.csail.mit.edu/cis/crypto/ projects/antiphishing/.
-
(2005)
MIT ComputerScience and Artificial Intelligence Laboratory, Tech. Rep.
-
-
Chau, D.1
-
8
-
-
33845530304
-
Distributed phishing attacks
-
Report 2005/091
-
M. Jakobsson and A. Young, "Distributed phishing attacks, " Cryptology ePrint Archive, Report 2005/091, 2005, http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive
-
-
Jakobsson, M.1
Young, A.2
-
9
-
-
0005044188
-
Profiling: A hidden challenge to the regulation of data surveillance
-
R. Clark, "Profiling: A hidden challenge to the regulation of data surveillance, " Journal of Law and Information Science, vol. 4, no. 2, 1993.
-
(1993)
Journal of Law and Information Science
, vol.4
, Issue.2
-
-
Clark, R.1
-
10
-
-
77958189601
-
-
January, retrieved July 15, 2007 from
-
"Market basket analysis, " Wikipedia, January 2007, retrieved July 15, 2007 from http://en.wikipedia.org/wiki/Market-Basket-Analysis.html.
-
(2007)
Market Basket Analysis
-
-
-
11
-
-
77958171052
-
Analysis of consumer behaviour online
-
retrieved July 15, 2007 from
-
D. Petrovic, "Analysis of consumer behaviour online, " Analogik.com, Tech. Rep., 2007, retrieved July 15, 2007 from http://analogik.com/article-analysis-of-consumer-behaviour-online.asp.
-
(2007)
Analogik.com, Tech. Rep.
-
-
Petrovic, D.1
-
12
-
-
77958190550
-
-
The National Mutual Life Association of Australasia Limited, retrieved July 20, from
-
"Investor profiles, " The National Mutual Life Association of Australasia Limited, retrieved July 20, 2007 from http://www.axafreedom.com.au/ freedom/freedom.nsf/content/InvestorProfiles.
-
(2007)
Investor Profiles
-
-
-
13
-
-
77958178028
-
Interactive investor profile tool
-
retrieved July 20, from
-
"Interactive investor profile tool, " Southside Bank: Trust & Investment Services Group, retrieved July 20, 2007 from http://www.southsidetrust.com/tool.htm.
-
(2007)
Southside Bank: Trust & Investment Services Group
-
-
-
14
-
-
77958159443
-
Offender profiling
-
November, retrieved July 26, 2007 from
-
"Offender profiling, "Wikipedia, November 2006, retrieved July 26, 2007 from http://en.wikipedia.org/wiki/Offender-profiling.html.
-
(2006)
Wikipedia
-
-
-
15
-
-
77958188076
-
FBI method of profiling
-
January, retrieved July 26, 2007 from
-
"FBI method of profiling, " Wikipedia, January 2006, retrieved July 26, 2007 from http://en.wikipedia.org/wiki/FBI-Method-of-Profiling.html.
-
(2006)
Wikipedia
-
-
-
16
-
-
77958186712
-
A free and comprehensive guide to the world of forensic psychology
-
retrieved July 28, 2007 from
-
D. Webb, "A free and comprehensive guide to the world of forensic psychology, " All About Forensic Psychology, retrieved July 28, 2007 from http://www.all-about-forensic-psychology.com/criminal-profiling.html.
-
All about Forensic Psychology
-
-
Webb, D.1
-
17
-
-
0037907534
-
Toulmin's philosophy of argument and its relevance to offender profiling
-
June
-
L. Alison, M. Smith, O. Eastman, and L. Rainbow, "Toulmin's philosophy of argument and its relevance to offender profiling, " Psychology, Crime and Law, vol. 9, no. 2, pp. 173-183, June 2003.
-
(2003)
Psychology, Crime and Law
, vol.9
, Issue.2
, pp. 173-183
-
-
Alison, L.1
Smith, M.2
Eastman, O.3
Rainbow, L.4
-
19
-
-
77958175761
-
Customer profiling survey solution enabling cross and up selling
-
retrieved July 29, 2007 from
-
"Customer profiling survey solution enabling cross and up selling, " Confirmit: Customer Survey, 2007, retrieved July 29, 2007 from http://www.confirmit.com/solutions/survey/customer%5Fprofiling/.
-
(2007)
Confirmit: Customer Survey
-
-
-
20
-
-
77958175996
-
-
"InterNIC : Whois search, " InterNIC - Public information Regarding Internel Domain Name Registration Services, http://www.internic.net/ whois.html.
-
InterNIC : Whois Search
-
-
-
21
-
-
84953767453
-
-
"The APNIC whois, " Asia Pacific Network Information Center, http://wq.apnic.net/apnic-bin/whois.pl.
-
The APNIC Whois
-
-
-
22
-
-
58149118021
-
-
"Ripe database, " RIPE Network Coordination Centre, http://www.ripe.net/index.html.
-
Ripe Database
-
-
-
23
-
-
77958187855
-
Applying clustering and ensemble clustering approaches to phishing profiling
-
CRPIT
-
D. Webb, J. Yearwood, P. Vamplew, M. Liping, B. Ofoghi, and A. Kelarev, "Applying clustering and ensemble clustering approaches to phishing profiling, " in Proceedings of AusDM 2009, The Australasian Data Mining Conference 2009. CRPIT, 2009.
-
(2009)
Proceedings of AusDM 2009, the Australasian Data Mining Conference 2009
-
-
Webb, D.1
Yearwood, J.2
Vamplew, P.3
Liping, M.4
Ofoghi, B.5
Kelarev, A.6
-
24
-
-
0033905095
-
BoosTexter: A boosting-based system for text categorization
-
R. Schapire and Y. Singer, "BoosTexter: A boosting-based system for text categorization, " Machine Learning, vol. 39(2/3), pp. 135-168, 2000.
-
(2000)
Machine Learning
, vol.39
, Issue.2-3
, pp. 135-168
-
-
Schapire, R.1
Singer, Y.2
|