-
2
-
-
84865698667
-
-
http://www.docs.sun.com/source/819-0063/im-architecture.html
-
-
-
-
4
-
-
84865693831
-
Legal Risks for Phishing Researchers
-
Soghoian, C.: Legal Risks For Phishing Researchers. IEEE Explorer (2009)
-
(2009)
IEEE Explorer
-
-
Soghoian, C.1
-
7
-
-
84865698662
-
-
IEEE
-
Appavu alias Balamurugan, S., Aravind, Athiappan, Bharathiraja, Pandian, M., Rajaram, R.: Association Rule Mining for Suspicious Email Detection: A Data Mining Approach. IEEE
-
Association Rule Mining for Suspicious Email Detection: A Data Mining Approach
-
-
Appavu Alias Balamurugan, S.1
Aravind2
Athiappan3
Bharathiraja4
Pandian, M.5
Rajaram, R.6
-
15
-
-
33749064633
-
Detecting and filtering instant messaging spam - A global and personalized approach
-
Liu, Z., Lin, W., Li, N., Lee, D.: Detecting and filtering instant messaging spam - a global and personalized approach. In: 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), November 6 (2005)
-
1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), November 6 (2005)
-
-
Liu, Z.1
Lin, W.2
Li, N.3
Lee, D.4
-
16
-
-
33747653575
-
A study of Internet instant messaging and chat protocols
-
Jennings, R.B., et al.: A study of Internet instant messaging and chat protocols. IEEE Network 20(4), 16-21 (2006)
-
(2006)
IEEE Network
, vol.20
, Issue.4
, pp. 16-21
-
-
Jennings, R.B.1
-
17
-
-
70449706139
-
Design and implementation of an instant messaging architecture for mobile collaborative learning
-
August
-
KaiFang, F.: Design and implementation of an instant messaging architecture for mobile collaborative learning. In: ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009 (August 2009)
-
(2009)
ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009
-
-
KaiFang, F.1
-
18
-
-
0030836948
-
A probabilistic relational algebra for the integration of information retrieval and database systems
-
January
-
Fuhr, N., Rölleke, T.: A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Transactions on Information Systems, TOIS (January 1997)
-
(1997)
ACM Transactions on Information Systems, TOIS
-
-
Fuhr, N.1
Rölleke, T.2
-
20
-
-
4944225515
-
Ontology based intelligent information retrieval system
-
Li, W., Feng, Z., Li, Y., Xu, Z.: Ontology based intelligent information retrieval system. In: Canadian Conference on Electrical and Computer Engineering (May 2004)
-
Canadian Conference on Electrical and Computer Engineering (May 2004)
-
-
Li, W.1
Feng, Z.2
Li, Y.3
Xu, Z.4
-
21
-
-
84865698674
-
A Phishing Detection Tool
-
Yu, W.D., Nargundkar, S., Tiruthani, N.: A Phishing Detection Tool. In: 33rd Annual IEEE International Computer Software and Applications Conference Washington, USA (July 2009)
-
33rd Annual IEEE International Computer Software and Applications Conference Washington, USA (July 2009)
-
-
Yu, W.D.1
Nargundkar, S.2
Tiruthani, N.3
-
22
-
-
54049142548
-
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
-
article 16 September
-
Herzberg, A., Jbara, A.: Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks. ACM Transactions on Internet Technology 8(4), article 16 (September 2008)
-
(2008)
ACM Transactions on Internet Technology
, vol.8
, Issue.4
-
-
Herzberg, A.1
Jbara, A.2
-
23
-
-
72349089708
-
Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy Data Mining
-
Aburrous, M., et al.: Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy Data Mining. In: International Conference on CyberWorlds (2009)
-
International Conference on CyberWorlds (2009)
-
-
Aburrous, M.1
-
24
-
-
33749066549
-
Architecture for Personal Semantic Web Information Retrieval System integrating we services and web contents
-
Yu, H., Mine, T., Amamiya, M.: Architecture for Personal Semantic Web Information Retrieval System integrating we services and web contents. In: Proceedings of the IEEE International Conference on Web Services in 2005, ICWS 2005 (2005)
-
(2005)
Proceedings of the IEEE International Conference on Web Services in 2005, ICWS 2005
-
-
Yu, H.1
Mine, T.2
Amamiya, M.3
-
25
-
-
72449205441
-
Identifying vulnerable websites by analysis of common strings in phishing URLs
-
October
-
Wardman, B., Shukla, G., Warner, G.: Identifying vulnerable websites by analysis of common strings in phishing URLs. In: eCrime Researchers Summit, eCRIME 2009 (October 2009)
-
(2009)
ECrime Researchers Summit, ECRIME 2009
-
-
Wardman, B.1
Shukla, G.2
Warner, G.3
|