-
2
-
-
79959464543
-
-
Anti-Phishing Working Group, "Phishing activity trends report," http://www.antiphishing.org/phishReportsArchive.html, 2010.
-
(2010)
Phishing Activity Trends Report
-
-
-
3
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proc. of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 635-647.
-
(2009)
Proc. of the 16th ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
5
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. H, "Statistical fraud detection: A review," Statistical Science, vol. 17, pp. 235-249, 2002.
-
(2002)
Statistical Science
, vol.17
, pp. 235-249
-
-
Bolton, R.J.1
H, D.J.2
-
8
-
-
84866660291
-
-
MaxMind. http://www.maxmind.com/app/ip-location, 2011.
-
(2011)
-
-
-
9
-
-
85010335250
-
Towards street-level client-independent IP geolocation
-
Mar.
-
Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards street-level client-independent IP geolocation," in Proc. of the 8th USENIX Symposium on Networked Systems Design and Implementation, Mar. 2011.
-
(2011)
Proc. of the 8th USENIX Symposium on Networked Systems Design and Implementation
-
-
Wang, Y.1
Burgener, D.2
Flores, M.3
Kuzmanovic, A.4
Huang, C.5
-
10
-
-
78650335645
-
Analysis of credential stealing attacks in an open networked environment
-
Washington, DC, USA: IEEE Computer Society
-
A. Sharma, Z. Kalbarczyk, R. Iyer, and J. Barlow, "Analysis of credential stealing attacks in an open networked environment," in Proc. of the Fourth International Conference on Network and System Security. Washington, DC, USA: IEEE Computer Society, 2010, pp. 144-151.
-
(2010)
Proc. of the Fourth International Conference on Network and System Security
, pp. 144-151
-
-
Sharma, A.1
Kalbarczyk, Z.2
Iyer, R.3
Barlow, J.4
-
11
-
-
0030652931
-
Cardwatch: A neural network based database mining system for credit card fraud detection
-
E. Aleskerov, B. Freisleben, and B. Rao, "Cardwatch: A neural network based database mining system for credit card fraud detection," Proc. of the IEEE IAFE 1997 conference on Computational Intelligence for Financial Engineering, pp. 220-226, 1997.
-
(1997)
Proc. of the IEEE IAFE 1997 Conference on Computational Intelligence for Financial Engineering
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
12
-
-
67349218861
-
Credit card fraud detection: A fusion approach using dempster-shafer theory and Bayesian learning
-
Oct.
-
S. Panigrahi, A. Kundu, S. Sural, and A. K. Majumdar, "Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning," Inf. Fusion, vol. 10, pp. 354-363, Oct. 2009.
-
(2009)
Inf. Fusion
, vol.10
, pp. 354-363
-
-
Panigrahi, S.1
Kundu, A.2
Sural, S.3
Majumdar, A.K.4
-
13
-
-
24944497370
-
Novel questionnaire-responded transaction approach with SVM for credit card fraud detection
-
R. Chen, T. Chen, Y. Chien, and Y. Yang, "Novel questionnaire- responded transaction approach with SVM for credit card fraud detection," in Proc. of the 2nd International Conference on Advances in Neural Networks, vol. 2, 2005, pp. 916-921.
-
(2005)
Proc. of the 2nd International Conference on Advances in Neural Networks
, vol.2
, pp. 916-921
-
-
Chen, R.1
Chen, T.2
Chien, Y.3
Yang, Y.4
-
14
-
-
34548577511
-
An empirical bayes approach to detect anomalies in dynamic multidimensional arrays
-
IEEE Computer Society
-
D. Agarwal, "An empirical Bayes approach to detect anomalies in dynamic multidimensional arrays," in Proc. of the Fifth IEEE International Conference on Data Mining. IEEE Computer Society, 2005, pp. 26-33.
-
(2005)
Proc. of the Fifth IEEE International Conference on Data Mining
, pp. 26-33
-
-
Agarwal, D.1
-
15
-
-
21944445756
-
Visual data mining: Recognizing telephone calling fraud
-
K. C. Cox, S. G. Eick, G. J. Wills, and R. J. Brachman, "Visual data mining: Recognizing telephone calling fraud," Data Mining and Knowledge Discovery, vol. 1, pp. 225-231, 1997.
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, pp. 225-231
-
-
Cox, K.C.1
Eick, S.G.2
Wills, G.J.3
Brachman, R.J.4
-
16
-
-
29144443664
-
Minority report in fraud detection: Classification of skewed data
-
C. Phua, D. Alahakoon, and V. Lee, "Minority report in fraud detection: Classification of skewed data," SIGKDD Explor. Newsl., vol. 6, no. 1, pp. 50-59, 2004.
-
(2004)
SIGKDD Explor. Newsl.
, vol.6
, Issue.1
, pp. 50-59
-
-
Phua, C.1
Alahakoon, D.2
Lee, V.3
-
17
-
-
0742324903
-
A formal framework for positive and negative detection schemes
-
F. Esponda, S. Forrest, and P. Helman, "A formal framework for positive and negative detection schemes," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 34, no. 1, pp. 357-373, 2004.
-
(2004)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.34
, Issue.1
, pp. 357-373
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
18
-
-
33646512999
-
One class support vector machines for detecting anomalous windows registry accesses
-
K. A. Heller, K. M. Svore, A. D. Keromytis, and S. J. Stolfo, "One class support vector machines for detecting anomalous windows registry accesses," in Proc. of the Workshop on Data Mining for Computer Security, 2003.
-
(2003)
Proc. of the Workshop on Data Mining for Computer Security
-
-
Heller, K.A.1
Svore, K.M.2
Keromytis, A.D.3
Stolfo, S.J.4
-
21
-
-
84867886541
-
-
M. Antonakakis, R. Perdisci, W. Lee, V. Nikolaos, and D. Dagon, "Detecting malware domains at the upper DNS hierarchy," pp. 1-16, 2011.
-
(2011)
Detecting Malware Domains at the Upper DNS Hierarchy
, pp. 1-16
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Nikolaos, V.4
Dagon, D.5
-
22
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: Learning to detect malicious web sites from suspicious URLs," in Proc. of the SIGKDD Conference., 2009.
-
(2009)
Proc. of the SIGKDD Conference.
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
23
-
-
34548268064
-
Authentication anomaly detection: A case study on a virtual private network
-
New York, NY, USA: ACM
-
M. Chapple, N. Chawla, and A. Striegel, "Authentication anomaly detection: A case study on a virtual private network," in Proc. of the 3rd Annual ACM Workshop on Mining Network Data. New York, NY, USA: ACM, 2007, pp. 17-22.
-
(2007)
Proc. of the 3rd Annual ACM Workshop on Mining Network Data
, pp. 17-22
-
-
Chapple, M.1
Chawla, N.2
Striegel, A.3
|