-
1
-
-
84862994711
-
-
Wikipedia, Phishing, Wikimedia Foundation, Inc. June 4
-
Wikipedia, Phishing, Wikimedia Foundation, Inc., http://en.wikipedia.org/wiki/Phishing, June 4, 2011
-
(2011)
-
-
-
2
-
-
80052998524
-
Global phishing survey 2H2010, anti-phishing working group
-
G. Aaron, R. Rasmussen, Global Phishing Survey 2H2010, Anti-Phishing Working Group, http://apwg.org/reports/APWG_GlobalPhishingSurvey_2H2010.pdf, 2011
-
(2011)
-
-
Aaron, G.1
Rasmussen, R.2
-
3
-
-
84862997435
-
Phishers have no mercy for Japan, symantec corporation
-
16 Mar
-
M. Maniyara, Phishers Have No Mercy for Japan, Symantec Corporation, http://www.symantec.com/connect/blogs-166, 16 Mar 2011
-
(2011)
-
-
Maniyara, M.1
-
4
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
Alexandria, Virginia, USA
-
S. Garera, N. Provos, M. Chew, A. D. Rubin, A framework for detection and measurement of phishing attacks, in: Proc. of 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, USA, 2007, 1-8
-
(2007)
Proc. of 2007 ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
5
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
J. Ma, L. K. Saul, S. Savage, G. M. Voelker, Beyond blacklists: Learning to detect malicious web sites from suspicious URLs, the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, 1245-1254
-
(2009)
The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
6
-
-
71149108237
-
Identifying suspicious URLs: An application of large-scale online learning
-
Montreal, Quebec, Canada
-
J. Ma, L. K. Saul, S. Savage, G. M. Voelker, Identifying suspicious URLs: An application of large-scale online learning, in: Proc. of the 26th Annual International Conference on Machine Learning, Montreal, Quebec, Canada, 2009, 681-688
-
(2009)
Proc. of the 26th Annual International Conference on Machine Learning
, pp. 681-688
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
7
-
-
78650083240
-
Lexical feature based phishing URL detection using online learning
-
Chicago, Illinois, USA
-
A. Blum, B. Wardman, T. Solorio, G. Warner, Lexical feature based phishing URL detection using online learning, in: Proc. of the 3rd ACM Workshop on Artificial Intelligence and Security, Chicago, Illinois, USA, 2010, 54-60
-
(2010)
Proc. of the 3rd ACM Workshop on Artificial Intelligence and Security
, pp. 54-60
-
-
Blum, A.1
Wardman, B.2
Solorio, T.3
Warner, G.4
-
8
-
-
35348905575
-
CANTINA: A content-based approach to detecting phishing web sites
-
Banff, Alberta, Canada
-
Y. Zhang, J. Hong, L. Cranor, CANTINA: A content-based approach to detecting phishing web sites, in: Proc. of the 16th International World Wide Web Conference, Banff, Alberta, Canada, 2007, 639-648
-
(2007)
Proc. of the 16th International World Wide Web Conference
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
9
-
-
84865616735
-
A hybrid phish detection approach by identity discovery and keywords retrieval
-
Madrid, Spain
-
G. Xiang, J. I. Hong, A hybrid phish detection approach by identity discovery and keywords retrieval, in: Proc. of the 18th International World Wide Web Conference, Madrid, Spain, 2009, 571-580
-
(2009)
Proc. of the 18th International World Wide Web Conference
, pp. 571-580
-
-
Xiang, G.1
Hong, J.I.2
-
10
-
-
79951758668
-
An content-analysis based large scale anti-phishing gateway
-
Nanjing, Jiangsu, China
-
J. Zhang, C. Wu, H. Guan, Q. Wang, An content-analysis based large scale anti-phishing gateway, in: Proc. of the 12th International Conference on Communication Technology, Nanjing, Jiangsu, China, 2010, 979-982
-
(2010)
Proc. of the 12th International Conference on Communication Technology
, pp. 979-982
-
-
Zhang, J.1
Wu, C.2
Guan, H.3
Wang, Q.4
-
11
-
-
0010057718
-
Semantic attacks: The third wave of network attacks
-
Oct 15
-
B. Schneier, Semantic attacks: The third wave of network attacks, Crypto-Gram Newsletter, http://www.schneier.com/crypto-gram-0010.html, Oct 15, 2000
-
(2000)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
12
-
-
67650963687
-
Representing ontologies using description logics
-
B. Motik, B. C. Grau, I. Horrocks, U. Sattler, Representing ontologies using description logics, Description Graphs, and Rules, Artif. Intell., vol. 173, 2009, 1275-1309
-
(2009)
Description Graphs, and Rules, Artif. Intell.
, vol.173
, pp. 1275-1309
-
-
Motik, B.1
Grau, B.C.2
Horrocks, I.3
Sattler, U.4
-
14
-
-
0034294901
-
Better decisions through science
-
J. A. Swets, R. M. Dawes, J. Monahan, Better decisions through science, Scientific American, vol. 283, 2000, 82-87
-
(2000)
Scientific American
, vol.283
, pp. 82-87
-
-
Swets, J.A.1
Dawes, R.M.2
Monahan, J.3
-
15
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, An introduction to ROC analysis, Pattern. Recogn. Lett., vol. 27, 2006, 861-874
-
(2006)
Pattern. Recogn. Lett.
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
16
-
-
33846894344
-
Receiver-operating characteristic analysis for evaluating diagnostic tests and predictive models
-
K. H. Zou, A. J. O'Malley, L. Mauri, Receiver-operating characteristic analysis for evaluating diagnostic tests and predictive models, Circulation, vol. 115, 2007, 654-657
-
(2007)
Circulation
, vol.115
, pp. 654-657
-
-
Zou, K.H.1
O'Malley, A.J.2
Mauri, L.3
|