-
2
-
-
33750966470
-
Exploring the characteristics of internet security breaches that impact the market value of breached firms
-
F.K. Andoh-Baidoo, and K.-M. Osei-Bryson Exploring the characteristics of internet security breaches that impact the market value of breached firms Expert Systems with Applications 32 3 2007 703 725
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.3
, pp. 703-725
-
-
Andoh-Baidoo, F.K.1
Osei-Bryson, K.-M.2
-
3
-
-
44049100108
-
Integrated fuzzy logic and data mining: Impact on cyber security
-
A.Q. Ansari, T. Patki, A.B. Patki, and V. Kumar Integrated fuzzy logic and data mining: impact on cyber security Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China 2007
-
(2007)
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China
-
-
Ansari, A.Q.1
Patki, T.2
Patki, A.B.3
Kumar, V.4
-
4
-
-
79151482437
-
-
Anti-Phishing Working Group
-
APWG Phishing Activity Trends Report December 2005 2005 Anti-Phishing Working Group 1 15 (http://www.antiphishing.org/reports/apwg-report-DEC2005- FINAL.pdf )
-
(2005)
Phishing Activity Trends Report December 2005
, pp. 1-15
-
-
-
5
-
-
79151485784
-
-
Anti-Phishing Working Group
-
APWG Phishing Activity Trends Report Second Half 2008 2009 Anti-Phishing Working Group 1 12 (http://www.antiphishing.org/reports/apwg-report-H2-2008.pdf )
-
(2009)
Phishing Activity Trends Report Second Half 2008
, pp. 1-12
-
-
-
6
-
-
0036532641
-
Bayesian neural network learning for repeat purchase modeling in direct marketing
-
B. Baesens, S. Viaene, D. Van den Poel, J. Vanthienen, and G. Dedene Bayesian neural network learning for repeat purchase modeling in direct marketing European Journal of Operational Research 138 1 2002 191 211
-
(2002)
European Journal of Operational Research
, vol.138
, Issue.1
, pp. 191-211
-
-
Baesens, B.1
Viaene, S.2
Van Den Poel, D.3
Vanthienen, J.4
Dedene, G.5
-
7
-
-
33745186426
-
Phishing mongers, and posers
-
H. Berghel Phishing mongers, and posers Communications of the ACM 49 4 2006 21 25
-
(2006)
Communications of the ACM
, vol.49
, Issue.4
, pp. 21-25
-
-
Berghel, H.1
-
8
-
-
40749083825
-
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
-
I. Bose, and A.C.M. Leung Unveiling the mask of phishing: threats, preventive measures, and responsibilities Communications of the Association for Information Systems 19 24 2007 544 566
-
(2007)
Communications of the Association for Information Systems
, vol.19
, Issue.24
, pp. 544-566
-
-
Bose, I.1
Leung, A.C.M.2
-
9
-
-
0035924010
-
Business data mining-a machine learning perspective
-
I. Bose, and R.K. Mahapatra Business data mining-a machine learning perspective Information & Management 39 3 2001 211 225
-
(2001)
Information & Management
, vol.39
, Issue.3
, pp. 211-225
-
-
Bose, I.1
Mahapatra, R.K.2
-
10
-
-
25444448031
-
Phishing anxiety may make you miss messages
-
A. Brandt Phishing anxiety may make you miss messages PC World 23 10 2005 34
-
(2005)
PC World
, vol.23
, Issue.10
, pp. 34
-
-
Brandt, A.1
-
11
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C.J.C. Burges A tutorial on support vector machines for pattern recognition Data Mining and Knowledge Discovery 2 2 1998 121 167
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
12
-
-
67249090254
-
Phishing e-mail detection based on structural properties
-
M. Chandrasekaran, K. Narayanan, and S. Upadhyaya Phishing e-mail detection based on structural properties Proceedings of NYS Cyber Security Conference, Albany, NY, USA 2006
-
(2006)
Proceedings of NYS Cyber Security Conference, Albany, NY, USA
-
-
Chandrasekaran, M.1
Narayanan, K.2
Upadhyaya, S.3
-
14
-
-
25144519584
-
Phish, and HIPs: Human interactive proofs to detect phishing attacks
-
R. Dhamija, and J.D. Tygar Phish, and HIPs: human interactive proofs to detect phishing attacks H.S. Baird, D.P. Lopresti, Proceedings of the Second International Workshop on Human Interactive Proofs, Bethlehem, PA, USA 2005 127 141
-
(2005)
Proceedings of the Second International Workshop on Human Interactive Proofs, Bethlehem, PA, USA
, pp. 127-141
-
-
Dhamija, R.1
Tygar, J.D.2
-
18
-
-
35348913799
-
Learning to detect phishing emails
-
I. Fette, N. Sadeh, and A. Tomasic Learning to detect phishing emails Proceedings of the Sixteenth International Conference on World Wide Web, Banff, Alberta, Canada 2007 649 656
-
(2007)
Proceedings of the Sixteenth International Conference on World Wide Web, Banff, Alberta, Canada
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
19
-
-
71649112504
-
E-mail classification for phishing defense, advances in information retrieval
-
W.N. Gansterer, and D. Polz E-mail classification for phishing defense, advances in information retrieval Proceedings of the Thirty-First European Conference on IR Research, Toulouse, France 2009 449 460
-
(2009)
Proceedings of the Thirty-First European Conference on IR Research, Toulouse, France
, pp. 449-460
-
-
Gansterer, W.N.1
Polz, D.2
-
20
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garera, N. Provos, M. Chew, and A.D. Rubin A framework for detection and measurement of phishing attacks Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, VA, USA 2007 1 8
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, VA, USA
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
21
-
-
85008020099
-
Phishing attacks rising, but dollar losses down
-
G. Goth Phishing attacks rising, but dollar losses down IEEE Security & Privacy Magazine 3 1 2005 8
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.1
, pp. 8
-
-
Goth, G.1
-
23
-
-
2342595855
-
Determining the appropriate amount of data for classifying consumers for direct marketing purposes
-
C.M. Heilman, F. Kaefer, and S.D. Ramenofsky Determining the appropriate amount of data for classifying consumers for direct marketing purposes Journal of Interactive Marketing 17 3 2003 5 28
-
(2003)
Journal of Interactive Marketing
, vol.17
, Issue.3
, pp. 5-28
-
-
Heilman, C.M.1
Kaefer, F.2
Ramenofsky, S.D.3
-
24
-
-
12444307548
-
ID theft: The US legal fight back
-
S. Hinde ID theft: the US legal fight back Computer Fraud & Security 2004 10 2004 7 9
-
(2004)
Computer Fraud & Security
, vol.2004
, Issue.10
, pp. 7-9
-
-
Hinde, S.1
-
25
-
-
61349124807
-
Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
-
C. Holton Identifying disgruntled employee systems fraud risk through text mining: a simple solution for a multi-billion dollar problem Decision Support Systems 46 4 2009 853 864
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 853-864
-
-
Holton, C.1
-
26
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer Social phishing Communications of the ACM 50 10 2006 1 10
-
(2006)
Communications of the ACM
, vol.50
, Issue.10
, pp. 1-10
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
28
-
-
13544274197
-
A neural network application to consumer classification to improve the timing of direct marketing activities
-
F. Kaefer, C.M. Heilman, and S.D. Ramenofsky A neural network application to consumer classification to improve the timing of direct marketing activities Computers & Operations Research 32 10 2005 2595 2615
-
(2005)
Computers & Operations Research
, vol.32
, Issue.10
, pp. 2595-2615
-
-
Kaefer, F.1
Heilman, C.M.2
Ramenofsky, S.D.3
-
29
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
A. Kankanhalli, H.-H. Teo, B.C.Y. Tan, and K.-K. Wei An integrative study of information systems security effectiveness International Journal of Information Management 23 2 2003 139 154
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
30
-
-
35948938098
-
Market reactions to information security breach announcements: An empirical analysis
-
K. Kannan, J. Rees, and S. Sridhar Market reactions to information security breach announcements: an empirical analysis International Journal of Electronic Commerce 12 1 2007 69 91
-
(2007)
International Journal of Electronic Commerce
, vol.12
, Issue.1
, pp. 69-91
-
-
Kannan, K.1
Rees, J.2
Sridhar, S.3
-
31
-
-
1242263532
-
Why there aren't more information security research studies?
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies? Information & Management 41 5 2004 597 607
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
32
-
-
67249151917
-
Lessons from a real world evaluation of anti-phishing training
-
Anti-phishing Working Group Atlanta, GA, USA
-
P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong Lessons from a real world evaluation of anti-phishing training Proceedings of the eCrime Researchers Summit 2008 2008 Anti-phishing Working Group Atlanta, GA, USA 1 12
-
(2008)
Proceedings of the ECrime Researchers Summit 2008
, pp. 1-12
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
-
34
-
-
2342532313
-
Criminals become tech savvy
-
E. Levy Criminals become tech savvy IEEE Security & Privacy 2 2 2004 65 68
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 65-68
-
-
Levy, E.1
-
36
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
K.D. Loch, H.H. Carr, and M.E. Warkentin Threats to information systems: today's reality, yesterday's understanding MIS Quarterly 16 2 1992 173 186
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
37
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
C. Ludl, S. McAllister, E. Kirda, and C. Kruegel On the effectiveness of techniques to detect phishing sites B.M. Hämmerli, R. Sommer, Proceedings of the Fourth International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Lucerne, Switzerland 2007 20 39
-
(2007)
Proceedings of the Fourth International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Lucerne, Switzerland
, pp. 20-39
-
-
Ludl, C.1
McAllister, S.2
Kirda, E.3
Kruegel, C.4
-
38
-
-
72049121891
-
Discovering company revenue relations from news: A network approach
-
Z. Ma, O.R.L. Sheng, and G. Pant Discovering company revenue relations from news: a network approach Decision Support Systems 47 4 2009 408 414
-
(2009)
Decision Support Systems
, vol.47
, Issue.4
, pp. 408-414
-
-
Ma, Z.1
Sheng, O.R.L.2
Pant, G.3
-
39
-
-
0031510754
-
Event studies in management research: Theoretical and empirical issues
-
A. McWilliams, and D. Siegel Event studies in management research: theoretical and empirical issues Academy of Management Journal 40 3 1997 626 657
-
(1997)
Academy of Management Journal
, vol.40
, Issue.3
, pp. 626-657
-
-
McWilliams, A.1
Siegel, D.2
-
40
-
-
79151480693
-
-
T. Powell Ounce of ID theft protection worth more than agony of restoring good name, MyWestTexas.com 2008 (http://www.mywesttexas.com/articles/2008/05/ 26/news/opinion/columns/trish-powell/bbb-5-23.txt )
-
(2008)
Academy of Management Journal
-
-
Powell, T.1
-
42
-
-
79151473926
-
-
Rulequest Research, Is See5/C5.0 Better Than C4.5? Rulequest Research
-
Rulequest Research, Is See5/C5.0 Better Than C4.5? Rulequest Research, 2008, (http://www.rulequest.com/see5-comparison.html ).
-
(2008)
-
-
-
43
-
-
48149087470
-
Learn to detect phishing scams using learning and ensemble methods
-
A. Saberi, M. Vahidi, and B.M. Bidgoli Learn to detect phishing scams using learning and ensemble methods Proceedings of the International Conferences on Web Intelligence and Intelligent Agent Technology Workshop, Silicon Valley, CA, USA 2007 311 314
-
(2007)
Proceedings of the International Conferences on Web Intelligence and Intelligent Agent Technology Workshop, Silicon Valley, CA, USA
, pp. 311-314
-
-
Saberi, A.1
Vahidi, M.2
Bidgoli, B.M.3
-
47
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin Intrusion detection by machine learning: a review Expert Systems with Applications 36 10 2009 1194 1200
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 1194-1200
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
49
-
-
33750315866
-
Accommodating individual preferences in the categorization of documents: A personalized clustering approach
-
C.-P. Wei, R.H.L. Chiang, and C.-C. Wu Accommodating individual preferences in the categorization of documents: a personalized clustering approach Journal of Management Information Systems 23 2 2006 173 201
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.2
, pp. 173-201
-
-
Wei, C.-P.1
Chiang, R.H.L.2
Wu, C.-C.3
-
50
-
-
4243198165
-
Threats to information security
-
M.E. Whitman Threats to information security Communications of the ACM 46 8 2003 91 95
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
51
-
-
39749142244
-
Wisecrackers, a theory-grounded investigation of phishing and pretext social engineering threats to information security
-
M. Workman Wisecrackers, a theory-grounded investigation of phishing and pretext social engineering threats to information security Journal of the American Society for Information Science and Technology 59 4 2008 662 674
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.4
, pp. 662-674
-
-
Workman, M.1
-
52
-
-
38049144217
-
A behavior-based detection approach to mass-mailing host
-
J. Zhang, Z.-H. Du, and W. Liu A behavior-based detection approach to mass-mailing host Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, China 2007 2140 2144
-
(2007)
Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, China
, pp. 2140-2144
-
-
Zhang, J.1
Du, Z.-H.2
Liu, W.3
-
54
-
-
50649094035
-
Random-forests-based network intrusion detection systems
-
J. Zhao, M. Zulkernine, and A. Haque Random-forests-based network intrusion detection systems IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews 38 5 2008 649 659
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhao, J.1
Zulkernine, M.2
Haque, A.3
-
55
-
-
0040431304
-
Data mining for network intrusion detection: A comparison of alternative methods
-
D. Zhu, G. Premkumar, X. Zhang, and C.-.H. Chu Data mining for network intrusion detection: a comparison of alternative methods Decision Sciences 32 4 2001 635 660
-
(2001)
Decision Sciences
, vol.32
, Issue.4
, pp. 635-660
-
-
Zhu, D.1
Premkumar, G.2
Zhang, X.3
Chu -. C, H.4
|