-
1
-
-
78149482317
-
-
Anti-Phishing Working Group, http://www.antiphishing.org/.
-
-
-
-
2
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial database with noise
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial database with noise. Proc. KDD 1996, pp. 226-231, 1996.
-
(1996)
Proc. KDD 1996
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
3
-
-
33745466910
-
The battle against phishing: Dynamic security skins
-
R. Dhamija and J. D. Tygar. The battle against phishing: dynamic security skins. Proc. SOUPS 2005.
-
Proc. SOUPS 2005
-
-
Dhamija, R.1
Tygar, J.D.2
-
4
-
-
34548170018
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
M. Wu, R. C. Miller, and G. Little. Web wallet: preventing phishing attacks by revealing user intentions. Proc. SOUPS, 2006.
-
Proc. SOUPS, 2006
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
5
-
-
33645131523
-
An anti-phishing strategy based on visual similarity assessment
-
W. Liu, X. T. Deng, G. L. Huang, and A. Y. Fu. An anti-phishing strategy based on visual similarity assessment. IEEE Internet Computing 10(2): 58-65, 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.T.2
Huang, G.L.3
Fu, A.Y.4
-
6
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
-
A. Y. Fu, W. Liu, X. T. Deng. Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD), IEEE Transactions on Dependable and Secure Computing3(4):301-311, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.2
Deng, X.T.3
-
7
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
Y. Zhang, J. I. Hong and L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. Proc. WWW 2007, pp. 639-648, 2007.
-
(2007)
Proc. WWW 2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
9
-
-
84865616735
-
A hybrid phish detection approach by identity discovery and keywords retrieval
-
G. Xiang and J. I. Hong. A hybrid phish detection approach by identity discovery and keywords retrieval. Proc. WWW 2009, pp. 571-580, 2009.
-
(2009)
Proc. WWW 2009
, pp. 571-580
-
-
Xiang, G.1
Hong, J.I.2
-
10
-
-
70449526286
-
Discovering phishing target based on semantic link network
-
Liu W., N. Fang, X. J. Quan, B. T. Qiu and G. Liu. Discovering phishing target based on semantic link network, Future Generation Computer Systems 26(3):381-388, 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.3
, pp. 381-388
-
-
Liu, W.1
Fang, N.2
Quan, X.J.3
Qiu, B.T.4
Liu, G.5
-
11
-
-
78149487468
-
-
PhishTank, http://www.phishtank.com/.
-
-
-
-
12
-
-
78149487919
-
-
Random Yahoo Link, http://random.yahoo.com/bin/ryl.
-
-
-
|