-
2
-
-
84861551458
-
-
Mc Afee, Tech. Rep.
-
D. Alperovitch, T. Dirro, P. Greve, R. Kashyap, D. Marcus, S. Masiello, F. Paget, and C. Schmugar, "2011 threats predictions," Mc Afee, Tech. Rep., 2010.
-
(2010)
2011 Threats Predictions
-
-
Alperovitch, D.1
Dirro, T.2
Greve, P.3
Kashyap, R.4
Marcus, D.5
Masiello, S.6
Paget, F.7
Schmugar, C.8
-
4
-
-
80052720248
-
Data mining techniques for suspicious email detection: A comparative study
-
Portugal
-
R. R. S. Appavu alias Balamurugan, "Data mining techniques for suspicious email detection: a comparative study," in European Conference on Data mining, Portugal, 2007.
-
(2007)
European Conference on Data Mining
-
-
Appavu, R.R.S.1
Balamurugan, A.2
-
5
-
-
35348818521
-
-
Retrieved Sep, Tech. Rep.
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails," Retrieved Sep, Tech. Rep., 2006.
-
(2006)
Learning to Detect Phishing Emails
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
6
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
DOI 10.1145/1242572.1242659, 16th International World Wide Web Conference, WWW2007
-
Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites," in WWW '07: Proceedings of the 16th international conference on World Wide Web. New York, NY, USA: ACM Press, 2007, pp. 639-648. (Pubitemid 47582293)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
7
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on twitter," in Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.
-
(2010)
Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
8
-
-
77958488685
-
Detecting spam bots in online social networking sites: A machine learning approach
-
Berlin, Heidelberg: Springer-Verlag
-
A. H. Wang, "Detecting spam bots in online social networking sites: a machine learning approach," in Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, ser. DBSec'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 335-342.
-
(2010)
Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Ser. DBSec'10
, pp. 335-342
-
-
Wang, A.H.1
-
9
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
February
-
V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions and reversals," Soviet Physics Doklady., vol. 10, no. 8, pp. 707-710, February 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.I.1
-
10
-
-
0010864753
-
Pattern recognition using generalized portrait method
-
V. Vapnik and A. Lerner, "Pattern recognition using generalized portrait method," Automation and Remote Control, vol. 24, 1963.
-
(1963)
Automation and Remote Control
, vol.24
-
-
Vapnik, V.1
Lerner, A.2
-
11
-
-
4944228528
-
-
Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan
-
C. W. Hsu, C. C. Chang, and C. J. Lin, A practical guide to support vector classification, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, 2003.
-
(2003)
A Practical Guide to Support Vector Classification
-
-
Hsu, C.W.1
Chang, C.C.2
Lin, C.J.3
-
13
-
-
78751493674
-
Who is tweeting on twitter: Human, bot, or cyborg?
-
New York, NY, USA: ACM
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Who is tweeting on twitter: human, bot, or cyborg?" in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC '10. New York, NY, USA: ACM, 2010, pp. 21-30.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, Ser. ACSAC '10
, pp. 21-30
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
|