-
1
-
-
33749551929
-
Why spoofing is serious internet fraud
-
T. Dinev, "Why spoofing is serious internet fraud", Commun. ACM, vol. 49, pp. 77-82, 2006.
-
(2006)
Commun. ACM
, vol.49
, pp. 77-82
-
-
Dinev, T.1
-
2
-
-
33750094361
-
Protecting users against phishing attacks
-
E. Kirda and C. Kruegel, "Protecting users against phishing attacks", Comput. J., vol. 49, no. 5, pp. 554-561, 2006.
-
(2006)
Comput. J.
, vol.49
, Issue.5
, pp. 554-561
-
-
Kirda, E.1
Kruegel, C.2
-
3
-
-
35348913799
-
Learning to detect phishing emails
-
New York, ACM
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails", in Proc. 16th Int. World Wide Web Conf. (WWW'07), New York, 2007, pp. 649-656, ACM.
-
(2007)
Proc. 16th Int. World Wide Web Conf. (WWW'07)
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
4
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?", in Proc. 2006 Conf. Human Factors in Computing Systems, 2006, pp. 601-610.
-
(2006)
Proc. 2006 Conf. Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
5
-
-
33745816410
-
Why phishing works
-
R. Dhamija, J. D. Tygar, and M. A. Hearst, "Why phishing works", in Proc. 2006 Conf. Human Factors in Computing Systems, 2006, pp. 581-590.
-
(2006)
Proc. 2006 Conf. Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.A.3
-
6
-
-
33749256984
-
Using visual features for antispam filtering
-
C. Wu, K. Cheng, Q. Zhu, and Y. Wu, "Using visual features for antispam filtering", in Proc. IEEE Int. Conf. Image Processing, 2005, pp. 509-512.
-
(2005)
Proc. IEEE Int. Conf. Image Processing
, pp. 509-512
-
-
Wu, C.1
Cheng, K.2
Zhu, Q.3
Wu, Y.4
-
7
-
-
34548786769
-
The emperor's new security indicators
-
IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The emperor's new security indicators", in Proc. IEEE Symp. Security and Privacy, 2007, pp. 51-65, IEEE Computer Society.
-
(2007)
Proc. IEEE Symp. Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
8
-
-
33847164488
-
A social network caught in the Web
-
Online. Available
-
L. A. Adamic, O. Buyukkokten, and E. Adar, "A social network caught in the Web", First Monday vol. 8, no. 6, 2003 [Online]. Available: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1057/977
-
(2003)
First Monday
, vol.8
, Issue.6
-
-
Adamic, L.A.1
Buyukkokten, O.2
Adar, E.3
-
9
-
-
34250687159
-
Invasive browser sniffing and countermeasures
-
M. Jakobsson and S. Stamm, L. Carr, D. D. Roure, A. Iyengar, C. A. Goble, and M. Dahlin, Eds., in, Edinburgh, Scotland, U. K., May 23-26, ACM
-
M. Jakobsson and S. Stamm, L. Carr, D. D. Roure, A. Iyengar, C. A. Goble, and M. Dahlin, Eds., "Invasive browser sniffing and countermeasures", in Proc. 15th Int. World Wide Web Conf. (WWW 2006), Edinburgh, Scotland, U. K., May 23-26, 2006, pp. 523-532, ACM.
-
(2006)
Proc. 15th Int. World Wide Web Conf. (WWW 2006)
, pp. 523-532
-
-
-
10
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing", Commun. ACM, vol. 50, no. 10, pp. 94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
11
-
-
52049111419
-
-
Cambridge, MA: MIT Press
-
R. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain, Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics). Cambridge, MA: MIT Press, 2008.
-
(2008)
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
-
-
Deibert, R.J.1
Palfrey, J.G.2
Rohozinski, R.3
Zittrain, J.4
-
12
-
-
33749551930
-
Who gets spammed?
-
I. Hann, K. Hui, Y. Lai, S. Lee, and I. Png, "Who gets spammed?", Commun. ACM, vol. 49, no. 10, pp. 83-87, 2006.
-
(2006)
Commun. ACM
, vol.49
, Issue.10
, pp. 83-87
-
-
Hann, I.1
Hui, K.2
Lai, Y.3
Lee, S.4
Png, I.5
-
13
-
-
34147094205
-
The effects of online advertising
-
S. McCoy, A. Everard, P. Polak, and D. Galletta, "The effects of online advertising", Commun. ACM, vol. 50, pp. 84-88, 2007.
-
(2007)
Commun. ACM
, vol.50
, pp. 84-88
-
-
McCoy, S.1
Everard, A.2
Polak, P.3
Galletta, D.4
-
14
-
-
33745190923
-
Next generation cyber forensics
-
B. Panda, J. Giordano, and D. Kalil, "Next generation cyber forensics", Commun. ACM, vol. 49, pp. 44-47, 2006.
-
(2006)
Commun. ACM
, vol.49
, pp. 44-47
-
-
Panda, B.1
Giordano, J.2
Kalil, D.3
-
15
-
-
84871197356
-
Comparison of texts streams in the presence of mild adversaries
-
Darlinghurst, Australia, Australian Computer Society, Inc
-
M. Malkin and R. Venkatesan, "Comparison of texts streams in the presence of mild adversaries", in Proc. 2005 Australasian Workshop on Grid Computing and e-Research (ACSW Frontiers'05), Darlinghurst, Australia, 2005, pp. 179-186, Australian Computer Society, Inc..
-
(2005)
Proc. 2005 Australasian Workshop on Grid Computing and E-Research (ACSW Frontiers'05)
, pp. 179-186
-
-
Malkin, M.1
Venkatesan, R.2
-
16
-
-
79251637110
-
Tools and technology of internet filtering
-
I. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain, Eds., in, Cambridge, MA: MIT Press
-
S. J. Murdoch and R. Anderson, I. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain, Eds., "Tools and technology of internet filtering", in Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics). Cambridge, MA: MIT Press, 2008.
-
(2008)
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
-
-
Murdoch, S.J.1
Anderson, R.2
-
17
-
-
78649401096
-
A language independent content extraction from web pages
-
New York, ACM
-
J. A. Moreno, K. Deschacht, and M.-F. Moens, "A language independent content extraction from web pages", in Proc. 9th Dutch-Belgian Information Retrieval Workshop (DIR 2009), New York, 2009, pp. 50-55, ACM.
-
(2009)
Proc. 9th Dutch-Belgian Information Retrieval Workshop (DIR 2009)
, pp. 50-55
-
-
Moreno, J.A.1
Deschacht, K.2
Moens, M.-F.3
-
18
-
-
33845807390
-
Spam filtering based on the analysis of text information embedded into images
-
G. Fumera, I. Pillai, and F. Roli, "Spam filtering based on the analysis of text information embedded into images", J. Mach. Learning Res., vol. 7, pp. 2699-2720, 2006.
-
(2006)
J. Mach. Learning Res.
, vol.7
, pp. 2699-2720
-
-
Fumera, G.1
Pillai, I.2
Roli, F.3
-
19
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, G. Cormack, B. Filipic, T. Lynam, and B. Zupan, "Spam filtering using statistical data compression models", J. Mach. Learning Res., vol. 7, pp. 2673-2698, 2006.
-
(2006)
J. Mach. Learning Res.
, vol.7
, pp. 2673-2698
-
-
Bratko, A.1
Cormack, G.2
Filipic, B.3
Lynam, T.4
Zupan, B.5
-
21
-
-
34548163666
-
-
W. N. Gansterer, M. Ilger, P. Lechner, R. Neumayer, and J. Strauss, Anti-Spam Methods-State of the Art Tech. Rep., 2005.
-
(2005)
Anti-Spam Methods-State of the Art Tech. Rep.
-
-
Gansterer, W.N.1
Ilger, M.2
Lechner, P.3
Neumayer, R.4
Strauss, J.5
-
22
-
-
57349173529
-
Detecting image spam using visual features and near duplicate detection
-
New York, ACM
-
B. Mehta, S. Nangia, M. Gupta, and W. Nejdl, "Detecting image spam using visual features and near duplicate detection", in Proc. 17th Int. World Wide Web Conf. (WWW'08), New York, 2008, pp. 497-506, ACM.
-
(2008)
Proc. 17th Int. World Wide Web Conf. (WWW'08)
, pp. 497-506
-
-
Mehta, B.1
Nangia, S.2
Gupta, M.3
Nejdl, W.4
-
23
-
-
34250667999
-
Detecting semantic cloaking on the web
-
New York, ACM
-
B. Wu and B. D. Davison, "Detecting semantic cloaking on the web", in Proc. 15th Int. Conf. World Wide Web (WWW'06), New York, 2006, pp. 819-828, ACM.
-
(2006)
Proc. 15th Int. Conf. World Wide Web (WWW'06)
, pp. 819-828
-
-
Wu, B.1
Davison, B.D.2
-
24
-
-
34250653315
-
Detecting spam web pages through content analysis
-
New York, ACM
-
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, "Detecting spam web pages through content analysis", in Proc. 15th Int. World Wide Web Conf. (WWW'06), New York, 2006, pp. 83-92, ACM.
-
(2006)
Proc. 15th Int. World Wide Web Conf. (WWW'06)
, pp. 83-92
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
25
-
-
78649400020
-
The spammer's compendium
-
MIT, Cambridge, MA
-
J. Graham-Cumming, "The spammer's compendium", in Proc. 2003 Spam Conf., MIT, Cambridge, MA, 2003.
-
(2003)
Proc. 2003 Spam Conf.
-
-
Graham-Cumming, J.1
-
26
-
-
78649399275
-
How to beat a Bayesian spam filter
-
MIT, Cambridge, MA
-
J. Graham-Cumming, "How to beat a Bayesian spam filter", in Proc. 2004 Spam Conf., MIT, Cambridge, MA, 2004.
-
(2004)
Proc. 2004 Spam Conf.
-
-
Graham-Cumming, J.1
-
27
-
-
0022986287
-
A document understanding system incorporating with character recognition
-
Y. Nakano, H. Fujisawa, O. Kunisaki, K. Okada, and T. Hananoi, "A document understanding system incorporating with character recognition", in Proc. Eighth Int. Conf. Pattern Recognition, 1986, pp. 801-803.
-
(1986)
Proc. Eighth Int. Conf. Pattern Recognition
, pp. 801-803
-
-
Nakano, Y.1
Fujisawa, H.2
Kunisaki, O.3
Okada, K.4
Hananoi, T.5
-
29
-
-
0005329163
-
A top-down approach for the analysis of document images
-
H. Fujisawa and Y. Nakano, "A top-down approach for the analysis of document images", in Proc. SSPR, 1990, pp. 113-122.
-
(1990)
Proc. SSPR
, pp. 113-122
-
-
Fujisawa, H.1
Nakano, Y.2
-
30
-
-
0042909758
-
Two complementary techniques for digitized document analysis
-
G. Nagy, J. Ianai, and M. Krishnamoorthy, "Two complementary techniques for digitized document analysis", in Proc. ACM Conf. Document Processing Systems, 1988, pp. 169-176.
-
(1988)
Proc. ACM Conf. Document Processing Systems
, pp. 169-176
-
-
Nagy, G.1
Ianai, J.2
Krishnamoorthy, M.3
-
31
-
-
0041957910
-
A preliminary investigation of techniques for automated reading of unformatted text
-
G. Nagy, "A preliminary investigation of techniques for automated reading of unformatted text", Commun. ACM, vol. 11, no. 7, pp. 480-487, 1968.
-
(1968)
Commun. ACM
, vol.11
, Issue.7
, pp. 480-487
-
-
Nagy, G.1
-
32
-
-
0015200792
-
An interactive system for reading unformatted printed text
-
Dec
-
R. N. Ascher, G. M. Koppelman, M. J. Miller, G. Nagy, and G. L. S., Jr., "An interactive system for reading unformatted printed text", IEEE Trans. Comput., vol. C-20, no. 12, pp. 1527-1543, Dec. 1971.
-
(1971)
IEEE Trans. Comput.
, vol.C-20
, Issue.12
, pp. 1527-1543
-
-
Ascher, R.N.1
Koppelman, G.M.2
Miller, M.J.3
Nagy, G.4
Jr., G.L.S.5
-
33
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: A review", ACM Comput. Surveys, vol. 31, pp. 264-323, 1999.
-
(1999)
ACM Comput. Surveys
, vol.31
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
34
-
-
84904802052
-
Detecting known and new salting tricks in unwanted emails
-
Mountain View, CA
-
A. Bergholz, G. Paass, F. Reichartz, S. Strobel, M.-F. Moens, and B. Witten, "Detecting known and new salting tricks in unwanted emails", in Proc. CEAS, Mountain View, CA, 2008.
-
(2008)
Proc. CEAS
-
-
Bergholz, A.1
Paass, G.2
Reichartz, F.3
Strobel, S.4
Moens, M.-F.5
Witten, B.6
|