-
2
-
-
80053621329
-
-
AccessedJanuary
-
Trojan.Spyeye j symantec. http://www.symantec.com/security response/writeup.jsp?docid=2010-020216-0135-99. AccessedJanuary 2011.
-
(2011)
Trojan.Spyeye J Symantec
-
-
-
4
-
-
70350685126
-
Introduction to machine learning
-
December
-
E. Alpaydin. Introduction to machine learning. Knowl. Eng. Rev., 20:432-433, December 2005.
-
(2005)
Knowl. Eng. Rev.
, vol.20
, pp. 432-433
-
-
Alpaydin, E.1
-
5
-
-
80052998524
-
-
1stQuarter, Accessed January 2011
-
Anti-Phishing Working Group (APWG). Global phishing survey: Trends and domain name use in 1h201. http://www.antiphishing.org/reports/APWG-G-1H2010.pdf, 1stQuarter 2010. Accessed January 2011.
-
(2010)
Global Phishing Survey: Trends and Domain Name Use in 1h201.
-
-
-
6
-
-
80053647438
-
-
1st Quarter2010. Accessed January
-
Anti-Phishing Working Group (APWG). Phishing activity trends report. http://www.antiphishing.org/reports/apwg-report-Q1-2010.pdf, 1st Quarter2010. Accessed January 2011.
-
(2011)
Phishing Activity Trends Report
-
-
-
7
-
-
67349178856
-
Fighting phishing with discriminative keypoint features
-
may-june
-
K.-T. Chen, J.-Y. Chen, C.-R. Huang, and C.-S. Chen. Fighting phishing with discriminative keypoint features. Internet Computing, IEEE, 13(3):56-63, may-june 2009.
-
(2009)
Internet Computing, IEEE
, vol.13
, Issue.3
, pp. 56-63
-
-
Chen, K.-T.1
Chen, J.-Y.2
Huang, C.-R.3
Chen, C.-S.4
-
8
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
New York, NY, USA, ACM
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pages 1-8, New York, NY, USA, 2007. ACM.
-
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM '07
, vol.2007
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
11
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
New York, NY, USA, ACM
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pages 88-99, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS '07
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
12
-
-
84904793179
-
-
S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang. An empirical analysis of phishing blacklists. http: //ceas.cc/2009/papers/ceas2009- paper-32.pdf,2009.
-
An Empirical Analysis of Phishing Blacklists.
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.F.4
Hong, J.5
Zhang, C.6
|