메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Automatically determining phishing campaigns using the USCAP methodology

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORSHIP ANALYSIS; BYPASS FILTERS; EXPERT ANALYSIS; FRAUDSTERS; HIGH STABILITY; PHISHERS; PHISHING; SOURCE CODES;

EID: 79952527132     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ecrime.2010.5706698     Document Type: Conference Paper
Times cited : (36)

References (34)
  • 1
    • 27344450109 scopus 로고    scopus 로고
    • Applying authorship analysis to extremist-group Web forum messages
    • A. Abbasi and H. Chen. Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems, 20(5):67-75, 2005. (Pubitemid 41527272)
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 67-75
    • Abbasi, A.1    Chen, H.2
  • 8
    • 34247150712 scopus 로고    scopus 로고
    • Effective identification of source code authors using byte-level information
    • Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
    • G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas. Effective identification of source code authors using byte-level information. In ICSE '06: Proceedings of the 28th international conference on Software engineering, pages 893-896, New York, NY, USA, 2006. ACM. (Pubitemid 46601013)
    • (2006) Proceedings - International Conference on Software Engineering , vol.2006 , pp. 893-896
    • Frantzeskou, G.1    Stamatatos, E.2    Gritzalis, S.3    Katsikas, S.4
  • 9
    • 33749140165 scopus 로고    scopus 로고
    • Source code author identification based on N-gram author profiles
    • DOI 10.1007/0-387-34224-9-59, Artificial Intelligence Applications and Innovations: 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI) 2006
    • G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas. Source code author identification based on n-gram author profiles. Artificial Intelligence Applications and Innovations, Volume 204/2006:508-515, 2006. (Pubitemid 44468913)
    • (2006) IFIP International Federation for Information Processing , vol.204 , pp. 508-515
    • Frantzeskou, G.1    Stamatatos, E.2    Gritzalis, S.3    Katsikas, S.4
  • 12
    • 0001138328 scopus 로고
    • A K-means clustering algorithm
    • J. A. Hartigan and M. A. Wong. A K-means clustering algorithm. Applied Statistics, 28:100-108, 1979.
    • (1979) Applied Statistics , vol.28 , pp. 100-108
    • Hartigan, J.A.1    Wong, M.A.2
  • 16
    • 0030653064 scopus 로고    scopus 로고
    • Authorship analysis: Identifying the author of a program
    • PII S0167404897000059
    • I. Krsul and E. H. Spafford. Authorship analysis: Identifying the author of a program. Computers & Security, 16(3):233-257, 1997. (Pubitemid 127399842)
    • (1997) Computers and Security , vol.16 , Issue.3 , pp. 233-257
    • Krsul, I.1    Spafford, E.H.2
  • 18
    • 72449167874 scopus 로고    scopus 로고
    • Determining provenance in phishing websites using automated conceptual analysis
    • Tacoma, WA, USA, 10
    • R. Layton and P. Watters. Determining provenance in phishing websites using automated conceptual analysis. In eCrime Researchers Summit 2009, Tacoma, WA, USA, 10 2009.
    • (2009) ECrime Researchers Summit 2009
    • Layton, R.1    Watters, P.2
  • 19
    • 67649999051 scopus 로고    scopus 로고
    • A cybercrime forensic method for chinese web information authorship analysis
    • J. Ma, G. Teng, Y. Zhang, Y. Li, and Y. Li. A cybercrime forensic method for chinese web information authorship analysis. Intelligence and Security Informatics, pages 14-24, 2009.
    • (2009) Intelligence and Security Informatics , pp. 14-24
    • Ma, J.1    Teng, G.2    Zhang, Y.3    Li, Y.4    Li, Y.5
  • 23
    • 58049158943 scopus 로고    scopus 로고
    • Forensic characteristics of phishing - Petty theft or organized crime?
    • J. Cordeiro, J. Filipe, and S. Hammoudi, editors, INSTICC Press
    • S. McCombie, P. Watters, A. Ng, and B. Watson. Forensic characteristics of phishing - petty theft or organized crime? In J. Cordeiro, J. Filipe, and S. Hammoudi, editors, WEBIST (1), pages 149-157. INSTICC Press, 2008.
    • (2008) WEBIST , Issue.1 , pp. 149-157
    • McCombie, S.1    Watters, P.2    Ng, A.3    Watson, B.4
  • 28
    • 0023453329 scopus 로고
    • SILHOUETTES: A GRAPHICAL AID TO THE INTERPRETATION AND VALIDATION OF CLUSTER ANALYSIS.
    • DOI 10.1016/0377-0427(87)90125-7
    • P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics, 20(1):53-65, 1987. (Pubitemid 18528483)
    • (1987) Journal of Computational and Applied Mathematics , vol.20 , pp. 53-65
    • Rousseeuw Peter, J.1
  • 30
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • December, 00:2006-12
    • R. Thomas and J. Martin. The underground economy: priceless. The USENIX Magazine, December, 00:2006-12, 2006.
    • (2006) The USENIX Magazine
    • Thomas, R.1    Martin, J.2
  • 32
  • 33
    • 63049134885 scopus 로고    scopus 로고
    • Tracking web spam with hidden style similarity
    • T. Urvoy, T. Lavergne, and P. Filoche. Tracking web spam with hidden style similarity. AIRWeb 2006 Program, 29:25, 2006.
    • (2006) AIRWeb 2006 Program , vol.29 , pp. 25
    • Urvoy, T.1    Lavergne, T.2    Filoche, P.3
  • 34
    • 33644552803 scopus 로고    scopus 로고
    • A framework for authorship identification of online messages: Writing-style features and classification techniques
    • R. Zheng, J. Li, H. Chen, and Z. Huang. A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology, 57(3):378-393, 2005.
    • (2005) Journal of the American Society for Information Science and Technology , vol.57 , Issue.3 , pp. 378-393
    • Zheng, R.1    Li, J.2    Chen, H.3    Huang, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.