-
1
-
-
67650687290
-
-
Anti Phishing Work Group [Online] Dec
-
Anti Phishing Work Group. Phishing attacks trends report. [Online] Available: 〈http://www.antiphishing.org〉 Dec. 2007.
-
(2007)
Phishing Attacks Trends Report
-
-
-
2
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
New York, NY, USA,2006.ACM
-
Abu-Nimeh, S, Nappa, D, Wang, S, and Nair, S. A comparison of machine learning techniques for phishing detection, In: e-crime 07: Proceedings of the anti phishing working groups 2nd annual e-crime researchers summit, pp. 60-69, New York, NY, USA,2006.ACM.
-
E-crime 07: Proceedings of the Anti Phishing Working Groups 2nd Annual E-crime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, S.3
Nair, S.4
-
3
-
-
71749098791
-
-
B. André, J. Beer, G. Sebastian, Marie Moens, P. Gerhard, and S. Siehyun New filtering approaches for phishing email Journal of Computer Security - EU-Funded ICT Research on Trust and Security 18 1 2010
-
(2010)
New Filtering Approaches for Phishing Email Journal of Computer Security - EU-Funded ICT Research on Trust and Security
, vol.18
, Issue.1
-
-
André, B.1
Beer, J.2
Sebastian, G.3
Moens, M.4
Gerhard, P.5
Siehyun, S.6
-
5
-
-
80054090564
-
An online model on evolving phishing e-mail detection and classification method
-
A. Al-Momani, W. Tat-Chee, K. Al-Saedi, A. Altaher, S. Ramadass, and A. Manasrah An online model on evolving phishing e-mail detection and classification method Journal of Applied Sciences 11 18 2011 3301 3307
-
(2011)
Journal of Applied Sciences
, vol.11
, Issue.18
, pp. 3301-3307
-
-
Al-Momani, A.1
Tat-Chee, W.2
Al-Saedi, K.3
Altaher, A.4
Ramadass, S.5
Manasrah, A.6
-
6
-
-
84904815319
-
Improved phishing detection using model based features
-
Bergholz A, Chang J, Paass G, Reichartz F, Strobel S. Improved phishing detection using model based features, In: Fifth conference for e-mail and Anti spam, CEAS 2008.
-
(2008)
Fifth Conference for E-mail and Anti Spam, CEAS
-
-
Bergholz, A.1
Chang, J.2
Paass, G.3
Reichartz, F.4
Strobel, S.5
-
8
-
-
0001345686
-
Context-sensitive learning methods for text categorization
-
W. Cohen, and Y. Singer Context-sensitive learning methods for text categorization ACM Transactions on Information Systems 17 2 1999 141 173
-
(1999)
ACM Transactions on Information Systems
, vol.17
, Issue.2
, pp. 141-173
-
-
Cohen, W.1
Singer, Y.2
-
10
-
-
77952390965
-
Fighting phishing with trusted email
-
Crain J, Opyrchal L, Prakash A. (2010) Fighting phishing with trusted email, international conference on availability, reliability, and security, 2010. ARES '10, Page(s): 462-467.
-
(2010)
International Conference on Availability, Reliability, and Security, 2010. ARES '10
, pp. 462-467
-
-
Crain, J.1
Opyrchal, L.2
Prakash, A.3
-
12
-
-
0023710206
-
Comparing the areas under two or more correlated receiver operating characteristic curves: A non-parametric approach
-
E.R. DeLong, D.M. DeLong, and D.L. Clark-Pearson Comparing the areas under two or more correlated receiver operating characteristic curves: a non-parametric approach Biometrics 44 1988 837 845
-
(1988)
Biometrics
, vol.44
, pp. 837-845
-
-
Delong, E.R.1
Delong, D.M.2
Clark-Pearson, D.L.3
-
14
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
-
Anthony Y. Fu, Liu Wenyin, and Xiaotie Deng Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD) IEEE Transactions on Dependable and Secure Computing 3 4 2006 301 311
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Wenyin, L.2
Deng, X.3
-
16
-
-
17044405923
-
Toward integrating feature selection Algorithms for Classification and Clustering
-
L. Huan, and Y. Lei Toward integrating feature selection Algorithms for Classification and Clustering IEEE Transaction on Knowledge and Data Engg 17 4 2005
-
(2005)
IEEE Transaction on Knowledge and Data Engg
, vol.17
, Issue.4
-
-
Huan, L.1
Lei, Y.2
-
19
-
-
80053634991
-
Textual and visual content-based anti-phishing: A Bayesian approach
-
Zhang Haijun, Liu Gang, T.W.S. Chow, and Liu Wenyin Textual and visual content-based anti-phishing: a Bayesian approach IEEE Transactions on Neural Networks 22 10 2011 1532 1546
-
(2011)
IEEE Transactions on Neural Networks
, vol.22
, Issue.10
, pp. 1532-1546
-
-
Haijun, Z.1
Gang, L.2
Chow, T.W.S.3
Wenyin, L.4
-
20
-
-
79957997863
-
An efficient phishing webpage detector
-
Mingxing. He, Shi-Jinn. Horng, Pingzhi. Fan, Mohammad. Khurram Khan, Ray-Shine. Run, and Jui-Lin. lai An efficient phishing webpage detector Expert Systems with Applications 38 10 2011 12018 12027
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 12018-12027
-
-
Mingxing, H.1
Horng, S.2
Jinn, H.3
Fan, P.4
Khurram, K.5
Mohammad, M.6
Run, R.7
Shine, M.8
Lai, J.9
-
25
-
-
33750094361
-
Protecting users against phishing attacks
-
E. Kirda, and C. Kruegel Protecting users against phishing attacks The Computer Journal 49 5 2006 554 561
-
(2006)
The Computer Journal
, vol.49
, Issue.5
, pp. 554-561
-
-
Kirda, E.1
Kruegel, C.2
-
26
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
July
-
C. Kruegel, G. Vigna, and W. Robertson A multi-model approach to the detection of web-based attacks Computer Networks 48 5 2005 717 738 July
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
27
-
-
80053293428
-
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
-
H. Kim, and J.H. Huh Detecting DNS-poisoning-based phishing attacks from their network performance characteristics IEEE Electronics Letters Volume 47 11 2011 656 658
-
(2011)
IEEE Electronics Letters Volume
, vol.47
, Issue.11
, pp. 656-658
-
-
Kim, H.1
Huh, J.H.2
-
29
-
-
72849117349
-
Detecting phishing emails using hybrid features
-
UIC-ATC '09
-
Liping Ma, Ofoghi, B, Watters, P, Brown, S. (2009) Detecting phishing emails using hybrid features, Symposia and workshops on ubiquitous, autonomic and trusted computing, 2009. UIC-ATC '09. pp. 493-497
-
(2009)
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
, pp. 493-497
-
-
Liping, M.1
Ofoghi, B.2
Watters, P.3
Brown, S.4
-
33
-
-
84857624229
-
Anti-phishing white paper
-
Microsoft
-
Microsoft. Anti-phishing white paper. Technical report, Microsoft, 2005.
-
(2005)
Technical Report, Microsoft
-
-
-
34
-
-
84870674753
-
-
Mozilla
-
Mozilla. Phishing protection, 2007. 〈http://www.mozilla.com/en-US/ firefox/phishing-protection/〉.
-
(2007)
Phishing Protection
-
-
-
35
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
New York, NY, USA ACM
-
Moore T, Clayton R. Examining the impact of website take-down on phishing, In: eCrime 07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pp. 1-13, New York, NY, USA, 2007. ACM.
-
(2007)
ECrime 07: Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
36
-
-
84858714671
-
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback
-
S.W. Neville, and M. Horie Controlling spam and spear phishing via peered network overlays and non-repudiable traceback eCrime Researchers Summit (eCrime) 2011 1 13
-
(2011)
ECrime Researchers Summit (ECrime)
, pp. 1-13
-
-
Neville, S.W.1
Horie, M.2
-
37
-
-
84870691909
-
-
Netcraft
-
Netcraft, 2007. 〈http://toolbar.netcraft.com/〉.
-
(2007)
-
-
-
39
-
-
84870710214
-
-
Phishingcorpus homepage Apr. [Online]
-
Phishingcorpus homepage Apr. 2006. [Online]. Available: 〈http://monkey.org/%7Ejose/wiki/doku〉.
-
(2006)
-
-
-
40
-
-
33744584654
-
Induction of decision trees
-
J. Quinlan Induction of decision trees Machine Learning 1 1986 81 106
-
(1986)
Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.1
-
41
-
-
0029678894
-
Improved use of continuous attributes in c4.5
-
J. Quinlan Improved use of continuous attributes in c4.5 Artificial Intelligence Research 4 1996 77 90
-
(1996)
Artificial Intelligence Research
, vol.4
, pp. 77-90
-
-
Quinlan, J.1
-
42
-
-
25144524330
-
A browser plug-in solution to the unique password problem
-
Ross B, Jackson C, Miyake N, Boneh D., Mitchell, J. A browser plug-in solution to the unique password problem, Proceedings of the 14th usenix security symposium, 〈http://crypto.stanford.edu/PwdHash/〉, 2005.
-
(2005)
Proceedings of the 14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
43
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
Madison, Wisconsin, AAAI technical report WS-98-05
-
Sahami M, Dumais S, Heckerman D, Horvitz E. A Bayesian approach to filtering junk e-mail, In: learning for text categorization: papers from the workshop, Madison, Wisconsin, AAAI technical report WS-98-05, 1998.
-
(1998)
Learning for Text Categorization: Papers from the Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
44
-
-
84870691629
-
-
Spamassassin public corpus [Online]
-
Spamassassin public corpus 2006. [Online].Available: 〈http:// spamassassin.apache.org/publiccorpus/php? id=PhishingCorpus〉.
-
(2006)
-
-
-
46
-
-
72449135688
-
Phishing detection using classifier ensembles, eCrime Researchers Summit, 2009
-
F. Toolan, and J. Carthy Phishing detection using classifier ensembles, eCrime Researchers Summit, 2009 eCRIME '09 2009 1 9
-
(2009)
ECRIME '09
, pp. 1-9
-
-
Toolan, F.1
Carthy, J.2
-
48
-
-
79955890012
-
Testing individual differences in phishing vulnerability within an integrated, information processing model
-
A. Vishwanath, T. Herath, R. Chen, J.H. Wang, and R. Rao Testing individual differences in phishing vulnerability within an integrated, information processing model Decision Support Systems 51 3 2011 576 586
-
(2011)
Decision Support Systems
, vol.51
, Issue.3
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
Wang, J.H.4
Rao, R.5
-
49
-
-
77953070493
-
Detection of phishing webpages based on visual similarity
-
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng Detection of phishing webpages based on visual similarity Procceeding of WWW 05 2005 1060 1061
-
(2005)
Procceeding of WWW
, vol.5
, pp. 1060-1061
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Min, Z.4
Deng, X.5
-
52
-
-
1942420344
-
Modified logistic regression: An approximation to SVM and its applications in large-scale text categorization
-
AAAI Press
-
Zhang J, Jin R, Yang Y, Hauptmann A. Modified logistic regression: an approximation to SVM and its applications in large-scale text categorization, In: Proceedings of the 20th international conference on machine learning. AAAI Press, pp. 888-895,2003.
-
(2003)
Proceedings of the 20th International Conference on Machine Learning
, pp. 888-895
-
-
Zhang, J.1
Jin, R.2
Yang, Y.3
Hauptmann, A.4
|