-
2
-
-
5444246382
-
-
Recommendation, W3C
-
Frank Manola and Eric Miller, "RDF primer," Recommendation, W3C, 2004, http://www.w3.org/TR/rdf-primer/.
-
(2004)
RDF primer
-
-
Manola, F.1
Miller, E.2
-
5
-
-
79960074426
-
Fedx: A federation layer for distributed query processing on linked open data
-
Andreas Schwarte, Peter Haase, Katja Hose, Ralf Schenkel, and Michael Schmidt, "Fedx: A federation layer for distributed query processing on linked open data," in ESWC (2), 2011, pp. 481-486.
-
(2011)
ESWC
, Issue.2
, pp. 481-486
-
-
Schwarte, A.1
Haase, P.2
Hose, K.3
Schenkel, R.4
Schmidt, M.5
-
6
-
-
84872853451
-
-
"Anti-phishing working group. http://www.antiphishing.org/.anti-phishingworkinggroup. http://www.antiphishing.org/.,".
-
Anti-phishing working group
-
-
-
7
-
-
33748985945
-
Online identity theft: phishing technology, chokepoints
-
Infosec Technology Transition Council, Department of Homeland Security, 2005. Accessed at
-
A. Emigh, "Online identity theft: phishing technology, chokepoints," Tech. Rep., and countermeasures. Technical Report, Infosec Technology Transition Council, Department of Homeland Security, 2005. Accessed at http://www.cyber.st.dhs.gov/docs/phishing-dhs-report.pdf, 2005.
-
(2005)
Tech. Rep., and countermeasures. Technical Report
-
-
Emigh, A.1
-
9
-
-
70350646591
-
A case study on asprox infection dynamics
-
Y. Shin, S. Myers, and M. Gupta, "A case study on asprox infection dynamics," Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 1-20, 2009.
-
(2009)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 1-20
-
-
Shin, Y.1
Myers, S.2
Gupta, M.3
-
13
-
-
85044841595
-
Client-side defense against web-based identity theft
-
NDSSŠ04
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J.C. Mitchell, "Client-side defense against web-based identity theft," in Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSSŠ04), 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
15
-
-
35348913799
-
Learning to detect phishing emails
-
ACM
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails," in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, pp. 649-656.
-
(2007)
Proceedings of the 16th international conference on World Wide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
16
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
ACM
-
S. Abu-Nimeh, D. Nappa, X.Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit. ACM, 2007, pp. 60-69.
-
(2007)
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
17
-
-
48149087470
-
Learn to detect phishing scams using learning and ensemble? methods
-
IEEE
-
A. Saberi, M. Vahidi, and B.M. Bidgoli, "Learn to detect phishing scams using learning and ensemble? methods," in Web Intelligence and Intelligent Agent Technology Workshops, 2007 IEEE/WIC/ACM International Conferences on. IEEE, 2007, pp. 311-314.
-
(2007)
Web Intelligence and Intelligent Agent Technology Workshops, 2007 IEEE/WIC/ACM International Conferences on
, pp. 311-314
-
-
Saberi, A.1
Vahidi, M.2
Bidgoli, B.M.3
-
18
-
-
77949778000
-
Multi-tier phishing email classification with an impact of classifier rescheduling
-
2009 10th International Symposium on. IEEE
-
M.R. Islam, J. Abawajy, and M.Warren, "Multi-tier phishing email classification with an impact of classifier rescheduling," in Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on. IEEE, 2009, pp. 789-793.
-
(2009)
Pervasive Systems, Algorithms, and Networks (ISPAN)
, pp. 789-793
-
-
Islam, M.R.1
Abawajy, J.2
Warren, M.3
-
19
-
-
77958185400
-
Profiling phishing emails based on hyperlink information
-
2010 International Conference on. IEEE
-
J. Yearwood, M. Mammadov, and A. Banerjee, "Profiling phishing emails based on hyperlink information," in Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on. IEEE, 2010, pp. 120-127.
-
(2010)
Advances in Social Networks Analysis and Mining (ASONAM)
, pp. 120-127
-
-
Yearwood, J.1
Mammadov, M.2
Banerjee, A.3
-
20
-
-
78049296520
-
Consensus clustering and supervised classification for profiling phishing emails in internet commerce security
-
R. Dazeley, J. Yearwood, B. Kang, and A. Kelarev, "Consensus clustering and supervised classification for profiling phishing emails in internet commerce security," Knowledge Management and Acquisition for Smart Systems and Services, pp. 235-246, 2011.
-
(2011)
Knowledge Management and Acquisition for Smart Systems and Services
, pp. 235-246
-
-
Dazeley, R.1
Yearwood, J.2
Kang, B.3
Kelarev, A.4
-
22
-
-
35348927906
-
-
CyLab, Carnegie Mellon University
-
L. Cranor, S. Egelman, J. Hong, and Y. Zhang, "Phinding phish: An evaluation of anti-phishing toolbars," CyLab, Carnegie Mellon University, 2006.
-
(2006)
Phinding phish: An evaluation of anti-phishing toolbars
-
-
Cranor, L.1
Egelman, S.2
Hong, J.3
Zhang, Y.4
-
23
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
ACM
-
M. Wu, R.C. Miller, and S.L. Garfinkel, "Do security toolbars actually prevent phishing attacks?," in Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 2006, pp. 601-610.
-
(2006)
Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
24
-
-
38549125103
-
Building anti-phishing browser plug-ins: An experience report
-
IEEE Computer Society
-
T. Raffetseder, E. Kirda, and C. Kruegel, "Building anti-phishing browser plug-ins: An experience report," in Proceedings of the Third International Workshop on Software Engineering for Secure Systems. IEEE Computer Society, 2007, p. 6.
-
(2007)
Proceedings of the Third International Workshop on Software Engineering for Secure Systems
, pp. 6
-
-
Raffetseder, T.1
Kirda, E.2
Kruegel, C.3
-
25
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J.C. Mitchell, "Stronger password authentication using browser extensions," in Proceedings of the 14th Usenix Security Symposium, 2005, vol. 1998.
-
(2005)
Proceedings of the 14th Usenix Security Symposium
, vol.1998
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
|