-
1
-
-
34548344520
-
-
A.-P. W. G. (APWG), 3rd Quarter
-
A.-P. W. G. (APWG), "Phishing activity trends report," http://www.antiphishing.org/reports/apwg-report-Q3-2009.pdf, 3rd Quarter 2009.
-
(2009)
Phishing Activity Trends Report
-
-
-
2
-
-
84857479064
-
-
accessed January 2011
-
"Trojan.Spyeye j symantec," http://www.symantec.com/security response/ writeup.jsp?docid=2010-020216-0135-99, accessed January 2011.
-
Trojan.Spyeye J Symantec
-
-
-
3
-
-
70349482303
-
An evaluation of users' anti-phishing knowledge retention
-
A. Alnajim and M. Munro, "An evaluation of users' anti-phishing knowledge retention," in Information Management and Engineering, 2009. ICIME '09. International Conference on, April 2009, pp. 210-214.
-
Information Management and Engineering, 2009. ICIME '09. International Conference On, April 2009
, pp. 210-214
-
-
Alnajim, A.1
Munro, M.2
-
4
-
-
84857483221
-
-
accessed March 2011
-
G. Gaffney, "The myth of the stupid user," http://www. infodesign.com.au/articles/themythofthestupiduser, accessed March 2011.
-
The Myth of the Stupid User
-
-
Gaffney, G.1
-
5
-
-
80053641138
-
Lexical url analysis for discriminating phishing and legitimate websites
-
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. New York, NY, USA: ACM, Online. Available
-
M. Khonji, Y. Iraqi, and A. Jones, "Lexical url analysis for discriminating phishing and legitimate websites," in Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. CEAS '11. New York, NY, USA: ACM, 2011, pp. 109-115. [Online]. Available: http://doi.acm.org/10.1145/2030376.2030389
-
(2011)
CEAS '11
, pp. 109-115
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
6
-
-
84904793179
-
-
S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, "An empirical analysis of phishing blacklists," http://ceas.cc/2009/ papers/ceas2009-paper-32.pdf, 2009.
-
(2009)
An Empirical Analysis of Phishing Blacklists
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.F.4
Hong, J.5
Zhang, C.6
-
7
-
-
35348913799
-
Learning to detect phishing emails
-
Proceedings of the 16th international conference on World Wide Web, ser. New York, NY, USA: ACM, Online. Available
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails,"in Proceedings of the 16th international conference on World Wide Web, ser. WWW '07. New York, NY, USA: ACM, 2007, pp. 649-656. [Online]. Available: http://doi.acm.org/10.1145/1242572.1242660
-
(2007)
WWW '07
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
8
-
-
80053654928
-
-
accessed July 2010.
-
J. Nazario, "Phishing corpus," http://monkey.org/~jose/wiki/ doku.php?id=phishingcorpus, accessed July 2010.
-
Phishing Corpus
-
-
Nazario, J.1
-
9
-
-
84928124564
-
-
accessed January 2011. [Online]. Available: http://spamassassin.apache. org/publiccorpus
-
SpamAssassin, "Public corpus," http://spamassassin.apache.org/ publiccorpus/, accessed January 2011. [Online]. Available: http://spamassassin. apache.org/publiccorpus/
-
Public Corpus
-
-
-
10
-
-
71749098791
-
New filtering approaches for phishing email
-
January Online. Available
-
A. Bergholz, J. De Beer, S. Glahn, M.-F. Moens, G. Paaß, and S. Strobel, "New filtering approaches for phishing email," J. Comput. Secur., vol. 18, pp. 7-35, January 2010. [Online]. Available: http://portal.acm.org/citation.cfm?id=1734234.1734239
-
(2010)
J. Comput. Secur.
, vol.18
, pp. 7-35
-
-
Bergholz, A.1
De Beer, J.2
Glahn, S.3
Moens, M.-F.4
Paaß, G.5
Strobel, S.6
-
12
-
-
35348927906
-
-
L. Cranor, S. Egelman, J. Hong, and Y. Zhang, "Phinding phish: An evaluation of anti-phishing toolbars," www.cylab.cmu.edu/files/ cmucylab06018.pdf, 2006.
-
(2006)
Phinding Phish: An Evaluation of Anti-phishing Toolbars
-
-
Cranor, L.1
Egelman, S.2
Hong, J.3
Zhang, Y.4
-
13
-
-
80053639164
-
A study of feature subset evaluators and feature subset searching methods for phishing classification
-
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. New York, NY, USA: ACM, Online. Available
-
M. Khonji, A. Jones, and Y. Iraqi, "A study of feature subset evaluators and feature subset searching methods for phishing classification," in Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, ser. CEAS '11. New York, NY, USA: ACM, 2011, pp. 135-144. [Online]. Available: http://doi.acm.org/10.1145/2030376. 2030392
-
(2011)
CEAS '11
, pp. 135-144
-
-
Khonji, M.1
Jones, A.2
Iraqi, Y.3
-
14
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. New York, NY, USA: ACM, Online. Available
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. eCrime '07. New York, NY, USA: ACM, 2007, pp. 60-69. [Online]. Available: http://doi.acm.org/10.1145/1299015.1299021
-
(2007)
ECrime '07
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
15
-
-
79952520242
-
Feature selection for spam and phishing detection
-
eCrime Researchers Summit (eCrime), 2010, ser. Dallas, TX
-
F. Toolan and J. Carthy, "Feature selection for spam and phishing detection," in eCrime Researchers Summit (eCrime), 2010, ser. eCrime '10, Dallas, TX, 2010.
-
(2010)
ECrime '10
-
-
Toolan, F.1
Carthy, J.2
-
16
-
-
67650695614
-
E-mail classification for phishing defense
-
Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval, ser. Berlin, Heidelberg: Springer-Verlag, Online. Available
-
W. N. Gansterer and D. Pölz, "E-mail classification for phishing defense," in Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval, ser. ECIR '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 449-460. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-00958-7 40
-
(2009)
ECIR '09
, pp. 449-460
-
-
Gansterer, W.N.1
Pölz, D.2
-
17
-
-
84991833843
-
-
Third Edition. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
-
I. H. Witten, E. Frank, and M. A. Hall, Data Mining: Practical Machine Learning Tools and Techniques (Third Edition). San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2011.
-
(2011)
Data Mining: Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
-
18
-
-
70350685126
-
Introduction to machine learning
-
December
-
E. Alpaydin, "Introduction to machine learning," Knowl. Eng. Rev., vol. 20, pp. 432-433, December 2005.
-
(2005)
Knowl. Eng. Rev.
, vol.20
, pp. 432-433
-
-
Alpaydin, E.1
|