-
1
-
-
84875139055
-
-
National Data-Deter. Detect. Defend. Avoid ID Theft, Accessed 21 July 2011
-
National Data-Deter. Detect. Defend. Avoid ID Theft.http://www.ftc.gov/ bcp/edu/microsites/idtheft/reference-desk/national-data.html. Accessed 21 July 2011
-
-
-
-
2
-
-
84875199285
-
-
Google Says Phishers Stole E-mail From US Officials, Others, PCWorld Business Center, Accessed 21 July 2011
-
Google Says Phishers Stole E-mail From US Officials, Others, PCWorld Business Center.http://www.pcworld.com/businesscenter/article/229202/google- says-phishers-stole-email-from-us-officials-others.html. Accessed 21 July 2011
-
-
-
-
3
-
-
84875176989
-
-
DNSBL Information-Spam Database Lookup, Accessed 21 July 2011
-
DNSBL Information-Spam Database Lookup.http://www.dnsbl.info/. Accessed 21 July 2011
-
-
-
-
4
-
-
84875130941
-
-
Snort-Home Page, Accessed 21 July 2011
-
Snort-Home Page.http://www.snort.org/. Accessed 21 July 2011
-
-
-
-
5
-
-
80053293428
-
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
-
doi:10.1049/el.2011.0399
-
H Kim, JH Huh, Detecting DNS-poisoning-based phishing attacks from their network performance characteristics. Electron Lett. 47(11):656-658 (2011). doi:10.1049/el.2011.0399
-
(2011)
Electron Lett
, vol.47
, Issue.11
, pp. 656-658
-
-
Kim, H.1
Huh, J.H.2
-
6
-
-
84875200545
-
-
ID Sender, Accessed 21 July 2011
-
ID Sender, http://www.microsoft.com/mscorp/safety/technologies/senderid/ default.mspx. Accessed 21 July 2011
-
-
-
-
7
-
-
84875133083
-
-
DomainKey Library and Implementor's Tools, Accessed 21 July 2011
-
DomainKey Library and Implementor's Tools.http://domainkeys.sourceforge. net/. Accessed 21 July 2011
-
-
-
-
8
-
-
21844475661
-
Dimension reduction in text classification with support vector machines
-
H Kim, P Howland, H Park, Dimension reduction in text classification with support vector machines. J Mach Learn Res. 6, 37-53 (2005)
-
(2005)
J Mach Learn Res
, vol.6
, pp. 37-53
-
-
Kim, H.1
Howland, P.2
Park, H.3
-
9
-
-
84875140413
-
-
SpamAssassin: Welcome to SpamAssassin, Accessed 19 July 2011
-
SpamAssassin: Welcome to SpamAssassin.http://spamassassin.apache.org/. Accessed 19 July 2011
-
-
-
-
10
-
-
35348913799
-
Learning to detect phishing emails
-
DOI 10.1145/1242572.1242660, 16th International World Wide Web Conference, WWW2007
-
I Fette, N Sadeh, A Tomasic, Learning to detect phishing emails. in Proceedings of the 16th international conference on World Wide Web, vol. 1. (Banff, AB, Canada, 2007), pp. 649-656 (Pubitemid 47582294)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
11
-
-
49049098349
-
A comparison of machine learning techniques for phishing detection
-
Pittsburgh, PA, USA
-
S Abu-Nimeh, D Nappa, X Wang, S Nair, A comparison of machine learning techniques for phishing detection. in Proceedings of the eCrime Researchers Summit, vol. 1. (Pittsburgh, PA, USA, 2007), pp. 60-69
-
(2007)
Proceedings of the ECrime Researchers Summit
, vol.1
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
12
-
-
70449493351
-
Distributed phishing detection by applying variable selection using bayesian additive regression trees
-
Dresden, Germany
-
S Abu-Nimeh, D Nappa, X Wang, S Nair, Distributed phishing detection by applying variable selection using Bayesian additive regression trees. in IEEE International Conference on Communications, vol. 1. (Dresden, Germany, 2009), pp. 1-5
-
(2009)
IEEE International Conference on Communications
, vol.1
, pp. 1-5
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
13
-
-
70349133496
-
An evaluation of machine learning-based methods for detection of phishing sites
-
Springer-Verlag, Heidelberg, Auckland, New Zealand
-
D Miyamoto, H Hazeyama, Y Kadobayashi, An evaluation of machine learning-based methods for detection of phishing sites. in Proceedings of the 15th International Conference on Advances in Neuro-Information Processing (Springer-Verlag, Heidelberg, 2009), vol. 1. (Auckland, New Zealand, 2008), pp. 539-546
-
(2009)
Proceedings of the 15th International Conference on Advances in Neuro-Information Processing
, vol.1
, pp. 539-546
-
-
Miyamoto, D.1
Hazeyama, H.2
Kadobayashi, Y.3
-
14
-
-
79952521124
-
-
eCrime Researchers Summit, Tacoma, WA, USA
-
F Toolan, J Carthy, Phishing Detection using Classifier Ensembles. (eCrime Researchers Summit, Tacoma, WA, USA, 2009)
-
(2009)
Phishing Detection Using Classifier Ensembles
-
-
Toolan, F.1
Carthy, J.2
-
15
-
-
71649112504
-
E-mail classification for phishing defense
-
Springer-Verlag, Heidelberg, Toulouse, France
-
WN Gansterer, D Pölz, E-mail classification for phishing defense. in Proceedings of the 31st European Conference on IR Research on Advances in Information Retrieval, (Springer-Verlag, Heidelberg, 2009), vol. 1. (Toulouse, France, 2009), pp. 449-460
-
(2009)
Proceedings of the 31st European Conference on IR Research on Advances in Information Retrieval
, vol.1
, pp. 449-460
-
-
Gansterer, W.N.1
Pölz, D.2
-
16
-
-
84904815319
-
Improved phishing detection using model-based features
-
Mountain View, California, USA
-
A Bergholz, J-H Chang, G Paaß, F Reichartz, S Strobel, Improved phishing detection using model-based features. in Proceedings of the Conference on Email and Anti-Spam (CEAS), vol. 1. (Mountain View, California, USA, 2008), pp. 1-10
-
(2008)
Proceedings of the Conference on Email and Anti-Spam (CEAS)
, vol.1
, pp. 1-10
-
-
Bergholz, A.1
Chang, J.-H.2
Paaß, G.3
Reichartz, F.4
Strobel, S.5
-
17
-
-
71749098791
-
New filtering approaches for phishing email
-
A Bergholz, JD Beer, S Glahn, MF Moens, G Paaß, S Strobel, New filtering approaches for phishing email. J Comput Secur. 18(1):7-35 (2010)
-
(2010)
J Comput Secur
, vol.18
, Issue.1
, pp. 7-35
-
-
Bergholz, A.1
Beer, J.D.2
Glahn, S.3
Moens, M.F.4
Paaß, G.5
Strobel, S.6
-
18
-
-
84904809721
-
A real-life study in phishing detection
-
Redmond, Washington, USA
-
A Bergholz, G Paaß, L D'Addona, D Dato, A real-life study in phishing detection. in Proceedings of the Conference on Email and Anti-Spam (CEAS), vol. 1. (Redmond, Washington, USA, 2010), pp. 1-10
-
(2010)
Proceedings of the Conference on Email and Anti-Spam (CEAS)
, vol.1
, pp. 1-10
-
-
Bergholz, A.1
Paaß, G.2
D'Addona, L.3
Dato, D.4
-
19
-
-
79952520242
-
Feature selection for spam and phishing detection
-
Dallas, Texas, USA
-
F Toolan, J Carthy, Feature Selection for Spam and Phishing Detection. in eCrime Researchers Summit, vol. 1. (Dallas, Texas, USA, 2010), pp. 1-12
-
(2010)
ECrime Researchers Summit
, vol.1
, pp. 1-12
-
-
Toolan, F.1
Carthy, J.2
-
20
-
-
84875131342
-
-
CEAS'11, Perth, Australia
-
M Khonji, A Jones, Y Iraqi, A Study of Feature Subset Evaluators and Feature Subset Searching Methods for Phishing Classification. (CEAS'11, Perth, Australia, 2011)
-
(2011)
A Study of Feature Subset Evaluators and Feature Subset Searching Methods for Phishing Classification
-
-
Khonji, M.1
Jones, A.2
Iraqi, Y.3
-
21
-
-
80054090564
-
An online model on evolving phishing e-mail detection and classification method
-
doi:10.3923/jas.2011.3301.3307
-
AAD Al-Momani, TC Wan, K Al-Saedi, A Altaher, S Ramadass, A Manasrah, LB Melhim, M Anbar, An online model on evolving phishing e-mail detection and classification method. J Appl Sci. 11(18):3301-3307 (2011). doi:10.3923/jas. 2011.3301.3307
-
(2011)
J Appl Sci
, vol.11
, Issue.18
, pp. 3301-3307
-
-
Al-Momani, A.A.D.1
Wan, T.C.2
Al-Saedi, K.3
Altaher, A.4
Ramadass, S.5
Manasrah, A.6
Melhim, L.B.7
Anbar, M.8
-
22
-
-
79961174131
-
Phishing detection using stochastic learning based weak estimators
-
Paris, France
-
J Zhan, L Thomas, Phishing detection using stochastic learning based weak estimators. in IEEE Symposium on Computation Intelligence in Cyber Security, vol. 1. (Paris, France, 2011), pp. 55-59
-
(2011)
IEEE Symposium on Computation Intelligence in Cyber Security
, vol.1
, pp. 55-59
-
-
Zhan, J.1
Thomas, L.2
-
23
-
-
84893432052
-
Profiling phishing activity based on hyperlinks extracted from phishing emails
-
J Yearwood, M Mammadov, D Webb, Profiling phishing activity based on hyperlinks extracted from phishing emails. J Social Netw Anal Mining. 2(1):5-16 (2011)
-
(2011)
J Social Netw Anal Mining.
, vol.2
, Issue.1
, pp. 5-16
-
-
Yearwood, J.1
Mammadov, M.2
Webb, D.3
-
24
-
-
81855218311
-
A feature-rich machine learning framework for detecting phishing web sites
-
Article 21
-
G Xiang, J Hong, CP Rose, L Cranor, A feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur 14(2):1-28 (2011). Article 21
-
(2011)
ACM Trans Inf Syst Secur
, vol.14
, Issue.2
, pp. 1-28
-
-
Xiang, G.1
Hong, J.2
Rose, C.P.3
Cranor, L.4
-
25
-
-
80053641138
-
Lexical URL analysis for discriminating phishing and legitimate websites
-
Perth, Australia
-
M Khonji, Y Iraqi, A Jones, Lexical URL analysis for discriminating phishing and legitimate websites. in Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, vol. 1. (Perth, Australia, 2011), pp. 109-115
-
(2011)
Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference
, vol.1
, pp. 109-115
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
26
-
-
80053634991
-
Textual and visual content-based anti-phishing: A Bayesian approach
-
H Zhang, G Liu, TWS Chow, W Liu, Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Trans Neural Netw. 22(10):1532-1546 (2011)
-
(2011)
IEEE Trans Neural Netw
, vol.22
, Issue.10
, pp. 1532-1546
-
-
Zhang, H.1
Liu, G.2
Chow, T.3
Liu, W.4
-
27
-
-
80053644849
-
Identify fixed-path phishing attack by STC
-
Perth, Australia
-
CH Hsu, P Wang, S Pu, Identify fixed-path phishing attack by STC. in Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, vol. 1. (Perth, Australia, 2011), pp. 172-175
-
(2011)
Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference
, vol.1
, pp. 172-175
-
-
Hsu, C.1
Wang, P.2
Pu, S.3
-
28
-
-
79958010910
-
A novel phishing classification based on url features
-
Dubai, UAE
-
M Khonji, A Jones, Y Iraqi, A novel phishing classification based on URL features. in IEEE GCC Conference and Exhibition, vol. 1. (Dubai, UAE, 2011), pp. 221-224
-
(2011)
IEEE GCC Conference and Exhibition
, vol.1
, pp. 221-224
-
-
Khonji, M.1
Jones, A.2
Iraqi, Y.3
-
29
-
-
84863287779
-
Anti-phishing through phishing target discovery
-
L Wenyin, G Liu, B Qiu, X Quan, Anti-phishing through phishing target discovery. IEEE J Internet Comput. 16(2):52-61 (2011)
-
(2011)
IEEE J Internet Comput
, vol.16
, Issue.2
, pp. 52-61
-
-
Wenyin, L.1
Liu, G.2
Qiu, B.3
Quan, X.4
-
30
-
-
84875168592
-
-
SpoofGuard, Accessed 21 July 2011
-
SpoofGuard.http://crypto.stanford.edu/SpoofGuard/. Accessed 21 July 2011
-
-
-
-
32
-
-
84875154165
-
-
CallingID-Your Protection from Identity Theft, Fraud, Scams and Malware, Accessed 21 July 2011
-
CallingID-Your Protection from Identity Theft, Fraud, Scams and Malware. http://www.callingid.com/Default.aspx. Accessed 21 July 2011
-
-
-
-
33
-
-
84875196742
-
-
CloudMark, Accessed 26 July 2011
-
CloudMark.http://www.cloudmark.com/en/products/cloudmark-desktopone/ index. Accessed 26 July 2011
-
-
-
-
34
-
-
84875146707
-
-
Netcraft Anti-Phishing Toolbar, Accessed 26 July 2011
-
Netcraft Anti-Phishing Toolbar.http://toolbar.netcraft.com/. Accessed 26 July 2011
-
-
-
-
35
-
-
84875185392
-
-
FirePhish, Accessed 26 July 2011
-
FirePhish, https://addons.mozilla.org/en-US/firefox/addon/firephish-anti- phishing-extens/. Accessed 26 July 2011
-
-
-
-
36
-
-
84875190168
-
-
eBay Toolbar, Accessed 21 July 2011
-
eBay Toolbar.http://download.cnet.com/eBay-Toolbar/3000-12512-4-10153544. html?tag=contentMain;downloadLinks. Accessed 21 July 2011
-
-
-
-
37
-
-
84875202207
-
-
IE Phishing Filter, Accessed 21 July 2011
-
IE Phishing Filter.http://support.microsoft.com/kb/930168. Accessed 21 July 2011
-
-
-
-
38
-
-
78049396315
-
Bypassing security toolbars and phishing filters via DNS poisoning
-
New Orleans, Louisiana, USA
-
S Ab-Nimeh, S Nair, Bypassing security toolbars and phishing filters via DNS poisoning. in IEEE Global Telecommunications Conference, vol. 1. (New Orleans, Louisiana, USA, 2008), pp. 1-6
-
(2008)
IEEE Global Telecommunications Conference
, vol.1
, pp. 1-6
-
-
Ab-Nimeh, S.1
Nair, S.2
-
39
-
-
84887488921
-
Implementing a web browser with phishing detection techniques
-
A Jain, V Richariya, Implementing a web browser with phishing detection techniques. World Comput Sci Inf Technol J. 1(7):28-291 (2011)
-
(2011)
World Comput Sci Inf Technol J.
, vol.1
, Issue.7
, pp. 28-291
-
-
Jain, A.1
Richariya, V.2
-
40
-
-
84875144475
-
-
Vancouver, BC, Canada, Accessed 21 July 2011
-
E Lin, S Greenberg, E Trotter, D Ma, J Aycok, Does domain highlighting help people identify phishing sites? CHI 2011. Vancouver, BC, Canada http://survey.mailfrontier.com/survey/phishing-uk.html (2011). Accessed 21 July 2011
-
(2011)
Does Domain Highlighting Help People Identify Phishing Sites? CHI 2011
-
-
Lin, E.1
Greenberg, S.2
Trotter, E.3
Ma, D.4
Aycok, J.5
-
41
-
-
79955877407
-
Interface design elements for anti-phishing systems
-
Springer Verlag, Berlin, Milwaukee, Wisconsin, USA, 2011
-
Y Chen, F Zahedi, A Abbasi, Interface design elements for anti-phishing systems. in Proc of the 6th International Conference on Service-Oriented Perspectives in Design Science Research (Springer-Verlag, Berlin, 2011), vol. 1. (Milwaukee, Wisconsin, USA, 2011), pp. 253-265
-
(2011)
Proc of the 6th International Conference on Service-Oriented Perspectives in Design Science Research
, vol.1
, pp. 253-265
-
-
Chen, Y.1
Zahedi, F.2
Abbasi, A.3
-
43
-
-
84875139841
-
-
Mail Frontier Phishing IQ Test-UK Edition, Accessed 21 July 2011
-
MailFrontier Phishing IQ Test-UK Edition.http://survey.mailfrontier.com/ survey/phishing-uk.html. Accessed 21 July 2011
-
-
-
-
44
-
-
33748964605
-
Don't be a phish: Steps in user education
-
Bologna, Italy
-
SA Robila, JW Ragucci, Don't be a phish: steps in user education. in Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, vol. 1. (Bologna, Italy, 2006), pp. 237-241
-
(2006)
Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education
, vol.1
, pp. 237-241
-
-
Robila, S.A.1
Ragucci, J.W.2
-
45
-
-
34848911641
-
-
TN Jagatic, NA Johnson, M Jakobsson, F Menczer, Social phishing Commun ACM. 50, 94-100 (2007)
-
(2007)
Social Phishing Commun ACM
, vol.50
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
46
-
-
80052568937
-
Design a mobile game for home computer users to prevent from phishing attacks
-
London, UK
-
NAG Arachchilage, M Cole, Design a mobile game for home computer users to prevent from phishing attacks. in IEEE International Conference on Information Society, vol. 1. (London, UK, 2011), pp. 485-489
-
(2011)
IEEE International Conference on Information Society
, vol.1
, pp. 485-489
-
-
Arachchilage, N.A.G.1
Cole, M.2
-
47
-
-
80955126696
-
Automatic content generation for anti-phishing education game
-
Yichang, China
-
SS Tseng, KY Chen, TJ Lee, JY Weng, Automatic content generation for anti-phishing education game. in IEEE International Conference on Electrical and Control Engineering, vol. 1. (Yichang, China, 2011), pp. 6390-6394
-
(2011)
IEEE International Conference on Electrical and Control Engineering
, vol.1
, pp. 6390-6394
-
-
Tseng, S.S.1
Chen, K.Y.2
Lee, T.J.3
Weng, J.Y.4
-
48
-
-
84861441778
-
The impact of public information on phishing attack and defense
-
T Moore, R Clayton, The impact of public information on phishing attack and defense. Commun Strat. 81(1):45-68 (2011)
-
(2011)
Commun Strat
, vol.81
, Issue.1
, pp. 45-68
-
-
Moore, T.1
Clayton, R.2
-
49
-
-
84875155023
-
-
Gillnet-Wikipedia, Accessed 25 July 2011
-
Gillnet-Wikipedia.http://en.wikipedia.org/wiki/Gillnet. Accessed 25 July 2011
-
-
-
-
50
-
-
84875136270
-
-
The Porter Stemming Algorithm, Accessed 26 July 2011
-
The Porter Stemming Algorithm.http://tartarus.org/~martin/PorterStemmer/. Accessed 26 July 2011
-
-
-
-
51
-
-
84875169003
-
-
WordNet, Accessed 26 July 2011
-
WordNet.http://wordnet.princeton.edu/. Accessed 26 July 2011
-
-
-
-
52
-
-
84875163047
-
-
Google Suggest API, Accessed 26 July 2011
-
Google Suggest API.http://code.google.com/p/google-refine/wiki/ SuggestApi. Accessed 26 July 2011
-
-
-
-
53
-
-
84875190208
-
-
Levenshtein distance, Accessed 26 July 2011
-
Levenshtein distance.http://en.wikipedia.org/wiki/Levenshtein-distance. Accessed 26 July 2011
-
-
-
-
54
-
-
85026972772
-
Probabilistic latent semantic indexing
-
Berkeley, California, USA
-
T Hofmann, Probabilistic latent semantic indexing. in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, vol. 1. (Berkeley, California, USA, 1999), pp. 50-57
-
(1999)
Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
, vol.1
, pp. 50-57
-
-
Hofmann, T.1
-
55
-
-
0034818212
-
Unsupervised learning by probabilistic Latent Semantic Analysis
-
DOI 10.1023/A:1007617005950
-
T Hofmann, Unsupervised learning by probabilistic latent semantic analysis. Mach Learn. 42, 177-196 (2001). doi:10.1023/A:1007617005950 (Pubitemid 32872403)
-
(2001)
Machine Learning
, vol.42
, Issue.1-2
, pp. 177-196
-
-
Hofmann, T.1
-
58
-
-
85149612939
-
Fast effective rule induction
-
Tahoe City, California, USA
-
WW Cohen, Fast effective rule induction. in 12th International Conference on Machine Learning, vol. 1. (Tahoe City, California, USA, 1995), pp. 115-123
-
(1995)
12th International Conference on Machine Learning
, vol.1
, pp. 115-123
-
-
Cohen, W.W.1
-
59
-
-
0035478854
-
Random forests
-
DOI 10.1023/A:1010933404324
-
L Breiman, Random forests. Mach Learn. 45(1):5-32 (2001). doi:10.1023/A:1010933404324 (Pubitemid 32933532)
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
61
-
-
33646420865
-
Speeding up logistic model tree induction
-
Springer, LNCS, Porto, Portugal
-
M Sumner, E Frank, M Gall, Speeding up logistic model tree induction. in 9th European Conference on Principles and Practice of Knowledge Discovery in Databases (Springer LNCS), vol. 3721. (Porto, Portugal, 2005), pp. 675-683
-
(2005)
9th European Conference on Principles and Practice of Knowledge Discovery in Databases
, vol.3721
, pp. 675-683
-
-
Sumner, M.1
Frank, E.2
Gall, M.3
-
62
-
-
0031620208
-
Combining labeled and unlabeled data with co-training
-
Madison, Wisconsin, USA
-
A Blum, T Mitchell, Combining labeled and unlabeled data with co-training. in Proceedings of the Workshop on Computation Learning Theory, (ACM), vol. 1. (Madison, Wisconsin, USA, 1998), pp. 92-100
-
(1998)
Proceedings of the Workshop on Computation Learning Theory ACM
, vol.1
, pp. 92-100
-
-
Blum, A.1
Mitchell, T.2
-
63
-
-
85136905861
-
Analyzing the effectiveness and applicability of co-training
-
McLean, Virginia, USA
-
K Nigam, R Ghani, Analyzing the effectiveness and applicability of co-training. in International Conference on Information and Knowledge Management, (ACM), vol. 1. (McLean, Virginia, USA, 2000), pp. 86-93
-
(2000)
International Conference on Information and Knowledge Managementti ACM)
, vol.1
, pp. 86-93
-
-
Nigam, K.1
Ghani, R.2
-
64
-
-
22944457138
-
Email classification with co-training
-
Toronto, Ontario, Canada
-
S Kiritchenko, S Matwin, Email classification with co-training. in Proceedings of CASCON, (ACM), vol. 1. (Toronto, Ontario, Canada, 2001), pp. 1-8
-
(2001)
Proceedings of CASCON ACM
, vol.1
, pp. 1-8
-
-
Kiritchenko, S.1
Matwin, S.2
-
65
-
-
15544385219
-
Co-training with a single natural feature set applied to email classification
-
Proceedings - IEEE/WIC/ACM International Conference on Web Intelligence, WI 2004
-
J Chan, I Koprinska, J Poon, Co-training with a single natural feature set applied to email classification. in Proceedings of the International Conference on Web Intelligence, vol. 1. (Beijing, China, 2004), pp. 586-589 (Pubitemid 40401170)
-
(2004)
Proceedings - IEEE/WIC/ACM International Conference on Web Intelligence, WI 2004
, pp. 586-589
-
-
Chan, J.1
Koprinska, I.2
Poon, J.3
-
67
-
-
80053441153
-
A co-training approach for multi-view spectral clustering
-
Bellevue, WA, USA
-
A Kumar, H Daumé III, A co-training approach for multi-view spectral clustering. in Proceedings of the 28th International Conference on Machine Learning, ACM, vol. 1. (Bellevue, WA, USA, 2011), pp. 393-400
-
(2011)
Proceedings of the 28th International Conference on Machine Learning ACM
, vol.1
, pp. 393-400
-
-
Kumar, A.1
Daumé Iii., H.2
-
68
-
-
84875183864
-
-
Spam Assassin Publiccorpus, Accessed 21 July 2011
-
SpamAssassin Publiccorpus.http://spamassassin.apache.org/publiccorpus/. Accessed 21 July 2011
-
-
-
-
69
-
-
84875125964
-
-
Phishing Corpus, Accessed 21 July 2011
-
PhishingCorpus.http://monkey.org/~jose/wiki/doku.php. Accessed 21 July 2011
-
-
-
-
70
-
-
84875176543
-
-
Enron Email Dataset, Accessed November 2011
-
Enron Email Dataset.http://www.cs.cmu.edu/~enron/. Accessed November 2011
-
-
-
-
71
-
-
84875178039
-
-
SPAM Archive, Accessed November 2011
-
SPAM Archive.http://untroubled.org/spam/. Accessed November 2011
-
-
-
-
72
-
-
84875165715
-
-
PhishTank, Accessed November 2011
-
PhishTank.http://www.phishtank.com. Accessed November 2011
-
-
-
-
73
-
-
84875126176
-
-
SURBL URI Reputation Data, Accessed November 2011
-
SURBL URI Reputation Data.http://www.surbl.org. Accessed November 2011
-
-
-
-
74
-
-
84875124055
-
-
Internet Security Threat Reports, Accessed November 2011
-
Internet Security Threat Reports.http://www.symantec.com/business/ threatreport/archive.jsp. Accessed November 2011.
-
-
-
|