-
1
-
-
27344450109
-
Applying authorship analysis to extremist-group Web forum messages
-
A. Abbasi and H. Chen. Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems, 20(5):67-75, 2005. (Pubitemid 41527272)
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
2
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
New York, NY, USA, ACM
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair. A comparison of machine learning techniques for phishing detection. In eCrime '07: Proceedings of the Anti-Phishing Working Group's 2nd annual eCrime Researchers Summit, pages 60-69, New York, NY, USA, 2007. ACM.
-
(2007)
ECrime '07: Proceedings of the Anti-Phishing Working Group's 2nd Annual ECrime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
6
-
-
49949095186
-
A graph-based clustering method and its applications
-
P. Foggia, G. Percannella, C. Sansone, and M. Vento. A graph-based clustering method and its applications. Advances in Brain, Vision, and Artificial Intelligence, pages 277-287, 2007.
-
(2007)
Advances in Brain, Vision, and Artificial Intelligence
, pp. 277-287
-
-
Foggia, P.1
Percannella, G.2
Sansone, C.3
Vento, M.4
-
7
-
-
62349110291
-
Identifying authorship by byte-level n-grams: The source code author profile (scap) method
-
G. Frantzeskou, E. Stamatatos, S. Gritzalis, and C. E. Chaski. Identifying authorship by byte-level n-grams: The source code author profile (scap) method. Int. Journal of Digital Evidence, 6(1), 2007.
-
(2007)
Int. Journal of Digital Evidence
, vol.6
, Issue.1
-
-
Frantzeskou, G.1
Stamatatos, E.2
Gritzalis, S.3
Chaski, C.E.4
-
8
-
-
34247150712
-
Effective identification of source code authors using byte-level information
-
Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
-
G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas. Effective identification of source code authors using byte-level information. In ICSE '06: Proceedings of the 28th international conference on Software engineering, pages 893-896, New York, NY, USA, 2006. ACM. (Pubitemid 46601013)
-
(2006)
Proceedings - International Conference on Software Engineering
, vol.2006
, pp. 893-896
-
-
Frantzeskou, G.1
Stamatatos, E.2
Gritzalis, S.3
Katsikas, S.4
-
9
-
-
33749140165
-
Source code author identification based on N-gram author profiles
-
DOI 10.1007/0-387-34224-9-59, Artificial Intelligence Applications and Innovations: 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI) 2006
-
G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas. Source code author identification based on n-gram author profiles. Artificial Intelligence Applications and Innovations, Volume 204/2006:508-515, 2006. (Pubitemid 44468913)
-
(2006)
IFIP International Federation for Information Processing
, vol.204
, pp. 508-515
-
-
Frantzeskou, G.1
Stamatatos, E.2
Gritzalis, S.3
Katsikas, S.4
-
11
-
-
34548117226
-
-
A. Gray, P. Sallis, and S. MacDonell. IDENTIFIED (Integrated Dictionary-based Extraction ofNon-language-dependent Token Information for Forensic Identification, Examination, and Discrimination): a dictionary-based system forextracting source code metrics for software forensics. pages 252-259, 1998.
-
(1998)
IDENTIFIED (Integrated Dictionary-based Extraction Of Non-language-dependent Token Information for Forensic Identification, Examination, and Discrimination): A Dictionary-based System Forextracting Source Code Metrics for Software Forensics
, pp. 252-259
-
-
Gray, A.1
Sallis, P.2
MacDonell, S.3
-
14
-
-
1842598475
-
A fuzzy logic approach to computer software source code authorship analysis
-
R. Kilgour, A. Gray, P. Sallis, and S. MacDonell. A fuzzy logic approach to computer software source code authorship analysis. International Conference on Neural Information Processing and Intelligent Information Systems, pages 865-868, 1997.
-
(1997)
International Conference on Neural Information Processing and Intelligent Information Systems
, pp. 865-868
-
-
Kilgour, R.1
Gray, A.2
Sallis, P.3
MacDonell, S.4
-
15
-
-
77949676631
-
Method for evaluating the security risk of a website against phishing attacks
-
Y.-G. Kim, S. Cho, J.-S. Lee, M.-S. Lee, I. Kim, and S. Kim. Method for evaluating the security risk of a website against phishing attacks. Intelligence and Security Informatics, 5075:2131, 2008.
-
(2008)
Intelligence and Security Informatics
, vol.5075
, pp. 2131
-
-
Kim, Y.-G.1
Cho, S.2
Lee, J.-S.3
Lee, M.-S.4
Kim, I.5
Kim, S.6
-
16
-
-
0030653064
-
Authorship analysis: Identifying the author of a program
-
PII S0167404897000059
-
I. Krsul and E. H. Spafford. Authorship analysis: Identifying the author of a program. Computers & Security, 16(3):233-257, 1997. (Pubitemid 127399842)
-
(1997)
Computers and Security
, vol.16
, Issue.3
, pp. 233-257
-
-
Krsul, I.1
Spafford, E.H.2
-
18
-
-
72449167874
-
Determining provenance in phishing websites using automated conceptual analysis
-
Tacoma, WA, USA, 10
-
R. Layton and P. Watters. Determining provenance in phishing websites using automated conceptual analysis. In eCrime Researchers Summit 2009, Tacoma, WA, USA, 10 2009.
-
(2009)
ECrime Researchers Summit 2009
-
-
Layton, R.1
Watters, P.2
-
19
-
-
67649999051
-
A cybercrime forensic method for chinese web information authorship analysis
-
J. Ma, G. Teng, Y. Zhang, Y. Li, and Y. Li. A cybercrime forensic method for chinese web information authorship analysis. Intelligence and Security Informatics, pages 14-24, 2009.
-
(2009)
Intelligence and Security Informatics
, pp. 14-24
-
-
Ma, J.1
Teng, G.2
Zhang, Y.3
Li, Y.4
Li, Y.5
-
20
-
-
72849117349
-
Detecting phishing emails using hybrid features
-
0
-
L. Ma, B. Ofoghi, P. Watters, and S. Brown. Detecting phishing emails using hybrid features. Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on, 0:493-497, 2009.
-
(2009)
Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
, pp. 493-497
-
-
Ma, L.1
Ofoghi, B.2
Watters, P.3
Brown, S.4
-
21
-
-
77949850958
-
Automatically generating classifier for phishing email prediction
-
0
-
L. Ma, R. Torney, P. Watters, and S. Brown. Automatically generating classifier for phishing email prediction. Parallel Architectures, Algorithms, and Networks, International Symposium on, 0:779-783, 2009.
-
(2009)
Parallel Architectures, Algorithms, and Networks, International Symposium on
, pp. 779-783
-
-
Ma, L.1
Torney, R.2
Watters, P.3
Brown, S.4
-
22
-
-
79952509266
-
-
S. MacDonell, A. Gray, G. MacLennan, and P. Sallis. Software forensics for discriminating between program authors using case-based reasoning, feed forward neural networks and multiple discriminant analysis. 1, 1999.
-
(1999)
Software Forensics for Discriminating between Program Authors Using Case-based Reasoning, Feed Forward Neural Networks and Multiple Discriminant Analysis
, vol.1
-
-
MacDonell, S.1
Gray, A.2
MacLennan, G.3
Sallis, P.4
-
23
-
-
58049158943
-
Forensic characteristics of phishing - Petty theft or organized crime?
-
J. Cordeiro, J. Filipe, and S. Hammoudi, editors, INSTICC Press
-
S. McCombie, P. Watters, A. Ng, and B. Watson. Forensic characteristics of phishing - petty theft or organized crime? In J. Cordeiro, J. Filipe, and S. Hammoudi, editors, WEBIST (1), pages 149-157. INSTICC Press, 2008.
-
(2008)
WEBIST
, Issue.1
, pp. 149-157
-
-
McCombie, S.1
Watters, P.2
Ng, A.3
Watson, B.4
-
24
-
-
85084094635
-
Behind phishing: An examination of phisher modi operandi
-
Berkeley, CA, USA, USENIX Association
-
D. K. McGrath and M. Gupta. Behind phishing: an examination of phisher modi operandi. In LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 1-8, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-8
-
-
McGrath, D.K.1
Gupta, M.2
-
25
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
New York, NY, USA, ACM
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In eCrime '07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pages 1-13, New York, NY, USA, 2007. ACM.
-
(2007)
ECrime '07: Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
28
-
-
0023453329
-
SILHOUETTES: A GRAPHICAL AID TO THE INTERPRETATION AND VALIDATION OF CLUSTER ANALYSIS.
-
DOI 10.1016/0377-0427(87)90125-7
-
P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics, 20(1):53-65, 1987. (Pubitemid 18528483)
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, pp. 53-65
-
-
Rousseeuw Peter, J.1
-
30
-
-
70350423437
-
The underground economy: Priceless
-
December, 00:2006-12
-
R. Thomas and J. Martin. The underground economy: priceless. The USENIX Magazine, December, 00:2006-12, 2006.
-
(2006)
The USENIX Magazine
-
-
Thomas, R.1
Martin, J.2
-
32
-
-
40949104348
-
Tracking web spam with html style similarities
-
T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking web spam with html style similarities. ACM Trans. Web, 2(1):1-28, 2008.
-
(2008)
ACM Trans. Web
, vol.2
, Issue.1
, pp. 1-28
-
-
Urvoy, T.1
Chauveau, E.2
Filoche, P.3
Lavergne, T.4
-
34
-
-
33644552803
-
A framework for authorship identification of online messages: Writing-style features and classification techniques
-
R. Zheng, J. Li, H. Chen, and Z. Huang. A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology, 57(3):378-393, 2005.
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.3
, pp. 378-393
-
-
Zheng, R.1
Li, J.2
Chen, H.3
Huang, Z.4
|