메뉴 건너뛰기




Volumn , Issue , 2011, Pages 190-195

Information source-based classification of automatic phishing website detectors

Author keywords

Anti phishing technique; information source

Indexed keywords

ANTI-PHISHING; COMMON FEATURES; INFORMATION SOURCES; PERSONAL INFORMATION; PHISHING; PHISHING ATTACKS;

EID: 80052984665     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINT.2011.34     Document Type: Conference Paper
Times cited : (8)

References (45)
  • 1
    • 85070848126 scopus 로고    scopus 로고
    • Trustworthiness Testing of Phishing Websites: A behavioral Model-based Approach
    • March Elsevier
    • H. Shahriar and M. Zulkernine, "Trustworthiness Testing of Phishing Websites: A behavioral Model-based Approach,"Future Generation Computer Systems, March 2011, Elsevier.
    • (2011) Future Generation Computer Systems
    • Shahriar, H.1    Zulkernine, M.2
  • 6
    • 80053017582 scopus 로고    scopus 로고
    • Accessed form
    • PhishTank, Accessed form http://phishtank.org
  • 9
    • 21244490135 scopus 로고    scopus 로고
    • Security Technologies go Phishing
    • June
    • D. Geer, "Security Technologies go Phishing," Computer Archive, Volume 38, Issue 6, June 2005, pp. 18-21.
    • (2005) Computer Archive , vol.38 , Issue.6 , pp. 18-21
    • Geer, D.1
  • 14
    • 80052989312 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, http://www.antiphishing.org.
  • 15
    • 80053003800 scopus 로고    scopus 로고
    • Internet Explorer 8
    • Internet Explorer 8, http://www.microsoft.com/
  • 21
    • 80052975275 scopus 로고    scopus 로고
    • Mozilla Firefox, http://www.mozilla.com/en-US/firefox.
  • 28
    • 70449526286 scopus 로고    scopus 로고
    • Discovering Phishing Target based on Semantic Link Network
    • Elsevier, March
    • L. Wenyin, N. Fang, X. Quan, B. Qiu, and G. Liu, "Discovering Phishing Target based on Semantic Link Network," Future Generation Computer Systems, Elsevier, Volume 26, Issue 3, March 2010, pp. 381-388.
    • (2010) Future Generation Computer Systems , vol.26 , Issue.3 , pp. 381-388
    • Wenyin, L.1    Fang, N.2    Quan, X.3    Qiu, B.4    Liu, G.5
  • 29
    • 33645131523 scopus 로고    scopus 로고
    • An Antiphishing Strategy Based on Visual Similarity Assessment
    • March
    • W. Liu, G. Huang, G. Huang, and A. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, Vol. 10, Issue 2, March 2006, pp. 58-65.
    • (2006) IEEE Internet Computing , vol.10 , Issue.2 , pp. 58-65
    • Liu, W.1    Huang, G.2    Huang, G.3    Fu, A.4
  • 30
    • 70350630557 scopus 로고    scopus 로고
    • Beyond Blacklists: Learning to Detect Malicious Websites from Suspicious URLs
    • J. Ma, L. Saul, S. Savag, and G. Voelker, "Beyond Blacklists: Learning to Detect Malicious Websites from Suspicious URLs," Proc. of KDD, Paris, Jun 2009, p. 1245-1254.
    • Proc. of KDD, Paris, Jun 2009 , pp. 1245-1254
    • Ma, J.1    Saul, L.2    Savag, S.3    Voelker, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.