-
1
-
-
34548344520
-
-
Last accessed Feb 20, 2012
-
Phishing Activity Trends Report, http://www.antiphishing.org/ phishReportsArchive.html, Last accessed Feb 20, 2012.
-
Phishing Activity Trends Report
-
-
-
2
-
-
84867393016
-
-
Last accessed Feb 20
-
Mobile Commerce Daily, http://www.mobilecommercedaily.com/2011/11/28/how- consumers-will-use-their-mobile-devices-during-the-holidays, Last accessed Feb 20, 2012.
-
(2012)
Mobile Commerce Daily
-
-
-
3
-
-
84867383843
-
-
Last accessed February 20, 2012
-
Trusteer, http://www.trusteer.com/blog/mobile-users-three-times-more- vulnerable-phishing-attacks, Last accessed February 20, 2012.
-
Trusteer
-
-
-
4
-
-
77952758134
-
Associative classification techniques for predicting e-Banking phishing websites
-
M. Aburrous, M. A. Hossain, K. Dahal and F. Thabtah, "Associative classification techniques for predicting e-Banking phishing websites", Internaional Conference on Multimedia Computing and Information Technology, Sharjah, 2010.
-
Internaional Conference on Multimedia Computing and Information Technology, Sharjah, 2010
-
-
Aburrous, M.1
Hossain, M.A.2
Dahal, K.3
Thabtah, F.4
-
5
-
-
84867348904
-
Anti-phishing by discovering phishing target
-
L. Wenyin, G. Liu, B. Qiu and X. Quan, "Anti-phishing by discovering phishing target", IEEE Internet Computing, Issue 99, 2011.
-
(2011)
IEEE Internet Computing
, Issue.99
-
-
Wenyin, L.1
Liu, G.2
Qiu, B.3
Quan, X.4
-
6
-
-
79957997863
-
An efficient phishing webpage detector
-
Elsevier
-
M. He, S. J. Horng, P. Fan, M. K. Khan, R. S. Run, J. L. Lai, R. J. Chen and A. Sutanto, "An efficient phishing webpage detector", Expert Systems with Applications, Elsevier, Vol. 38, 2011.
-
(2011)
Expert Systems with Applications
, vol.38
-
-
He, M.1
Horng, S.J.2
Fan, P.3
Khan, M.K.4
Run, R.S.5
Lai, J.L.6
Chen, R.J.7
Sutanto, A.8
-
7
-
-
81855218311
-
A feature-rich machine learning framework for detecting phishing websites
-
Article 21, September
-
G. Xiang, J. Hong, C. P. Rose and L. Cranor, "A feature-rich machine learning framework for detecting phishing websites", ACM Transaction on Information Systems Security, Vol. 14, Article 21, September, 2011.
-
(2011)
ACM Transaction on Information Systems Security
, vol.14
-
-
Xiang, G.1
Hong, J.2
Rose, C.P.3
Cranor, L.4
-
8
-
-
79958010910
-
A novel phishing classification based on URL features
-
M. Khonji, A. Jones and Y. Iraqi, "A novel phishing classification based on URL features", IEEE GCC Conference and Exhibition, Dubai, 2011.
-
IEEE GCC Conference and Exhibition, Dubai, 2011
-
-
Khonji, M.1
Jones, A.2
Iraqi, Y.3
-
9
-
-
80053634991
-
Textual and visual content-based anti phishing: A Bayesian Approach
-
H. Zhang, G. Liu, T. W. S. Chow and W Liu, "Textual and visual content-based anti phishing: A Bayesian Approach, IEEE Transactions on Neural Networks, Vol. 22, No. 10, 2011.
-
(2011)
IEEE Transactions on Neural Networks
, vol.22
, Issue.10
-
-
Zhang, H.1
Liu, G.2
Chow, T.W.S.3
Liu, W.4
-
10
-
-
80053644849
-
Identify fixed path phishing attack by STC
-
C. H. Hsu, P. Wang and S. Pu, "Identify fixed path phishing attack by STC", Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Perth, Australia, September 2011.
-
Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Perth, Australia, September 2011
-
-
Hsu, C.H.1
Wang, P.2
Pu, S.3
-
11
-
-
84903603956
-
Phishing on mobile devices
-
Oakland, Calfornia, May
-
A P. Felt and D. Wagner, "Phishing on mobile devices," Web 2.0 Security & Privacy 2011, Oakland, Calfornia, May, 2011.
-
(2011)
Web 2.0 Security & Privacy 2011
-
-
Felt, A.P.1
Wagner, D.2
-
12
-
-
84883415810
-
-
Tor Project: Last accessed Feb 20, 2011
-
Tor Project: Anonymity Online, Last accessed Feb 20, 2011.
-
Anonymity Online
-
-
-
13
-
-
0141607824
-
Latent Dirichlet Allocation
-
D. M. Blei, A. Y. Ng, M. I. Jordan, "Latent Dirichlet Allocation", Journal of Machine Learning Research, Vol. 3, pp. 993-1022, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
16
-
-
1842788824
-
Finding scientific topics
-
T. L. Griffiths and M. Steyvers, "Finding scientific topics", Proceedings of the National Academy of Sciences of the USA, 101 (Suppl. 1), pp 5228-5235, 2004.
-
(2004)
Proceedings of the National Academy of Sciences of the USA
, vol.101
, Issue.SUPPL. 1
, pp. 5228-5235
-
-
Griffiths, T.L.1
Steyvers, M.2
-
17
-
-
84867359705
-
-
Last accessed Feb 20, 2012
-
Stanford TMT, http://nlp.stanford.edu/software/tmt/tmt-0.4/, Last accessed Feb 20, 2012.
-
-
-
-
21
-
-
0035478854
-
Random Forests
-
L. Breiman, Random Forests, Machine Learning, 45(1), pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
27
-
-
84867344729
-
-
Last accessed Feb 20, 2012
-
DMOZ, http://www.dmoz.org/, Last accessed Feb 20, 2012.
-
-
-
-
28
-
-
84867359712
-
-
Last accessed Feb 20, 2012
-
Alexa, http://www.alexa.com/, Last accessed Feb 20, 2012.
-
-
-
-
29
-
-
84867348907
-
-
Last accessed Feb 20, 2012
-
Phishtank, http://www.phishtank.com/, Last accessed Feb 20, 2012.
-
-
-
-
30
-
-
84867385135
-
-
Last accesed Feb 20, 2012
-
Tesseract, http://code.google.com/p/tesseract-ocr/, Last accesed Feb 20, 2012.
-
Tesseract
-
-
-
31
-
-
84867344730
-
-
Last accesed Feb 20, 2012
-
Google Labs, http://code.google.com/labs/, Last accesed Feb 20, 2012.
-
-
-
|