-
1
-
-
79959464543
-
-
APWG
-
APWG, 2010. Phishing activity trends report, http: //www. antiphishing. org/reports/apwg_report_ q2_2010.pdf
-
(2010)
Phishing Activity Trends Report
-
-
-
2
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
ACM New York
-
Abu-Nimeh, S., D. Nappa, X. Wang and S. Nair, 2007. A comparison of machine learning techniques for phishing detection. Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit (eCrime '07), ACM New York, pp: 60-69.
-
(2007)
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit (eCrime '07)
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
3
-
-
78649870800
-
-
Bergholz, A., J.H. Chang, G. Paaß, F. Reichartzand S. Strobel, 2008. Improved phishing detection using model-based features. http:// www.ceas.ee /2008/papers/ceas2008-paper-44.pdf
-
(2008)
Improved Phishing Detection Using Model-based Features
-
-
Bergholz, A.1
Chang, J.H.2
Paaß, G.3
Strobel, F.4
Reichartzand, S.5
-
4
-
-
33751060448
-
Efficient infonnation extraction using machine learning and classification using genetic and C4.8 algorithms
-
Christy, A. and P. Thambidurai, 2006. Efficient infonnation extraction using machine learning and classification using genetic and C4.8 algorithms. Inform. Technol. J., 5: 1023-1027.
-
(2006)
Inform. Technol. J
, vol.5
, pp. 1023-1027
-
-
Christy, A.1
Thambidurai, P.2
-
5
-
-
78049296520
-
Consensus Clustering and Supervised Classi Cation for Pro Ling Phishing Emails in Internet Commerce Security
-
Kang, B.H. and D. Richards (Eds.), Springer, Berlin Heidelberg, New York, pp
-
Dazeley, R., J.L. Yearwood, B.H. Kang and A. V. Kelarev, 2010. Consensus Clustering and Supervised Classi Cation for Pro Ling Phishing Emails in Internet Commerce Security. In: Knowledge Management and Acquisition for Smart Systems and Services, Kang, B.H. and D. Richards (Eds.), Springer, Berlin Heidelberg, New York, pp: 235-246.
-
(2010)
Knowledge Management and Acquisition For Smart Systems and Services
, pp. 235-246
-
-
Dazeley, R.1
Yearwood, J.L.2
Kang, B.H.3
Kelarev, A.V.4
-
6
-
-
33749588863
-
A comparative study of clustering algorithms
-
Dehun, S., C. Mohapatra, A. Ghosh and R. Mall, 2006. A comparative study of clustering algorithms. Inform. Technol. J., 5: 551-559.
-
(2006)
Inform. Technol. J
, vol.5
, pp. 551-559
-
-
Dehun, S.1
Mohapatra, C.2
Ghosh, A.3
Mall, R.4
-
8
-
-
35348913799
-
Learning to detect phishing emails
-
May 8-12, ACM Press, Banff, Alberta, Canada
-
Fette, I., N. Sadeh and A. Tomasic, 2007. Learning to detect phishing emails. Proceedings of the 16th International World Wide Web Conference, May 8-12, ACM Press, Banff, Alberta, Canada, pp: 649-656.
-
(2007)
Proceedings of the 16th International World Wide Web Conference
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
9
-
-
33745771703
-
An agent-based model for agriculture e-commerce system
-
Folorunso, O., S.K. Sharma, H.O.D. Longe and K. Lasaki, 2006. An agent-based model for agriculture e-commerce system. Inform. Technol. J., 5: 230-234.
-
(2006)
Inform. Technol. J
, vol.5
, pp. 230-234
-
-
Folorunso, O.1
Sharma, S.K.2
Longe, H.O.D.3
Lasaki, K.4
-
11
-
-
77949778000
-
Multi-tier phishing email classification with an impact of classifier rescheduling
-
Dec. 14-16, IEEE, Kaohsiung, Taiwan
-
Islam, M.R., J. Abawajy and M. Warren, 2009. Multi-tier phishing email classification with an impact of classifier rescheduling. Proceeding of the International Symposium on Pervasive Systems, Algorithms and Networks, Dec. 14-16, IEEE, Kaohsiung, Taiwan, pp: 789-793.
-
(2009)
Proceeding of the International Symposium On Pervasive Systems, Algorithms and Networks
, pp. 789-793
-
-
Islam, M.R.1
Abawajy, J.2
Warren, M.3
-
12
-
-
0036530967
-
Denfis: Dynamic evolving neural-fuzzy inference system and its application for time-series prediction
-
Kasabov, N. and Q. Song, 2002. Denfis: Dynamic evolving neural-fuzzy inference system and its application for time-series prediction. Fuzzy Syst, 10: 144-154.
-
(2002)
Fuzzy Syst
, vol.10
, pp. 144-154
-
-
Kasabov, N.1
Song, Q.2
-
13
-
-
0141629793
-
Evolving Connectionist Systems: Methods and Applications in Bio informatics
-
Springer Verlag Heidelberg, New York, London, Pages
-
Kasabov, N.K., 2003. Evolving Connectionist Systems: Methods and Applications in Bio informatics, Brain Study and Intelligent Machines. Springer Verlag Heidelberg, New York, London, Pages: 307.
-
(2003)
Brain Study and Intelligent Machines
, pp. 307
-
-
Kasabov, N.K.1
-
14
-
-
77956455652
-
Information systems for enhancing customer relationships
-
Lin, J., 2010. Information systems for enhancing customer relationships. Inform. Technol. J., 9: 1306-1316.
-
(2010)
Inform. Technol. J
, vol.9
, pp. 1306-1316
-
-
Lin, J.1
-
15
-
-
33745125863
-
Information gain ratio as term weight: The case of summarization of IR results. Proceedings of the 19th International Conference on Computational Linguistics, (COLING '02)
-
Mori, T., 2002. Information gain ratio as term weight: The case of summarization of IR results. Proceedings of the 19th International Conference on Computational Linguistics, (COLING '02), Association for Computational Linguistics, pp: 1-7.
-
(2002)
Association for Computational Linguistics
, pp. 1-7
-
-
Mori, T.1
-
16
-
-
34748889655
-
Machine learning technique approaches in drug discovery, design and development
-
Pugazhenthi, D. and S.P. Rajagopalan, 2007. Machine learning technique approaches in drug discovery, design and development. Inform. Technol. J., 6: 718-724.
-
(2007)
Inform. Technol. J
, vol.6
, pp. 718-724
-
-
Pugazhenthi, D.1
Rajagopalan, S.P.2
-
17
-
-
37249034138
-
Clustering methods for statistical analysis of genome databases
-
Ranjan, J. and S. Khalil, 2007. Clustering methods for statistical analysis of genome databases. Inform. Technol. J., 6: 1217-1223.
-
(2007)
Inform. Technol. J
, vol.6
, pp. 1217-1223
-
-
Ranjan, J.1
Khalil, S.2
-
18
-
-
48149087470
-
Learn to detect phishing scams using learning and ensemble: Methods
-
(WI-IATW '07), IEEE Computer Society Washington, DC, pp
-
Saberi, A., M. Vahidi and B.M. Bidgoli, 2007. Learn to detect phishing scams using learning and ensemble: Methods. Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, (WI-IATW '07), IEEE Computer Society Washington, DC, pp: 311-314.
-
(2007)
Proceedings of the IEEE/WIC/ACM International Conferences On Web Intelligence and Intelligent Agent Technology
, pp. 311-314
-
-
Saberi, A.1
Vahidi, M.2
Bidgoli, B.M.3
-
19
-
-
10844248817
-
Weighted data normalizations and feature selection for evolving connectionist systems proceedings
-
(US'03), Queensland, Sydney, Australia
-
Song, Q. and N. Kasabov, 2003. Weighted data normalizations and feature selection for evolving connectionist systems proceedings. Proceedings of the 8th Australian and New Zealand Intelligence Information Systems, (US'03), Queensland, Sydney, Australia, pp: 285-290.
-
(2003)
Proceedings of the 8th Australian and New Zealand Intelligence Information Systems
, pp. 285-290
-
-
Song, Q.1
Kasabov, N.2
-
20
-
-
34648827799
-
Automated classification of customer emails via association rule mining
-
Subramanian, S.K. and N. Ramaraj, 2007. Automated classification of customer emails via association rule mining. Inform. Technol. J., 6: 567-572.
-
(2007)
Inform. Technol. J
, vol.6
, pp. 567-572
-
-
Subramanian, S.K.1
Ramaraj, N.2
-
21
-
-
62749188887
-
Selecting and combining classifiers simultaneously with particle swarm optimization
-
Yang, L.Y., J.Y. Zhang and W.J. Wang, 2009. Selecting and combining classifiers simultaneously with particle swarm optimization. Inform. Technol. J., 8: 241-245.
-
(2009)
Inform. Technol. J
, vol.8
, pp. 241-245
-
-
Yang, L.Y.1
Zhang, J.Y.2
Wang, W.J.3
-
22
-
-
77958185400
-
Profiling phishing emails based on hyperlink information
-
IEEE Computer Society Washington, DC, pp
-
Yearwood, J., M. Mammadov and A. Banerjee, 2010. Profiling phishing emails based on hyperlink information. Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, (ASONAM '10), IEEE Computer Society Washington, DC, pp: 120-127.
-
(2010)
Proceedings of the International Conference On Advances In Social Networks Analysis and Mining, (ASONAM '10)
, pp. 120-127
-
-
Yearwood, J.1
Mammadov, M.2
Banerjee, A.3
-
23
-
-
41549143683
-
Research on spam classifier based on features of spammer's behaviours
-
Zhen, L., T. Liang and Z. Ming-Tian, 2008. Research on spam classifier based on features of spammer's behaviours. Inform. Technol. J., 7: 165-169.
-
(2008)
Inform. Technol. J
, vol.7
, pp. 165-169
-
-
Zhen, L.1
Liang, T.2
Ming-Tian, Z.3
|