메뉴 건너뛰기




Volumn 2, Issue 1, 2012, Pages 5-16

Profiling phishing activity based on hyperlinks extracted from phishing emails

Author keywords

Multi label classification; Phishing; Profiling phishing emails

Indexed keywords

ADAPTIVE BOOSTING; CLASSIFICATION (OF INFORMATION); ELECTRONIC MAIL; FORECASTING; HYPERTEXT SYSTEMS; SOCIAL SCIENCES COMPUTING;

EID: 84893432052     PISSN: 18695450     EISSN: 18695469     Source Type: Journal    
DOI: 10.1007/s13278-011-0031-y     Document Type: Article
Times cited : (16)

References (39)
  • 1
    • 0037907534 scopus 로고    scopus 로고
    • Toulmin’s philosophy of argument and its relevance to offender profiling
    • Alison L, Smith M, Eastman O, Rainbow L (2003) Toulmin’s philosophy of argument and its relevance to offender profiling. Psychol Crime Law 9(2):173–183
    • (2003) Psychology, Crime and Law , vol.9 , Issue.2 , pp. 173-183
    • Alison, L.1    Smith, M.2    Eastman, O.3    Rainbow, L.4
  • 2
    • 84947278706 scopus 로고    scopus 로고
    • Analysis of user keyword similarity in online social networks. Social Netw Anal Min
    • Bhattacharyya P, Garg A, Wu SF (2010) Analysis of user keyword similarity in online social networks. Social Netw Anal Min. doi:10.1007/s13278-010-0006-4
    • (2010) doi:10.1007/s13278-010-0006-4
    • Bhattacharyya, P.1    Garg, A.2    Wu, S.F.3
  • 3
    • 85041447514 scopus 로고    scopus 로고
    • Markmonitor.com
    • Brandjacking index (2009) Markmonitor.com, Spring 2009. http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
    • (2009) Spring , pp. 2009
    • index, B.1
  • 4
    • 0036330608 scopus 로고    scopus 로고
    • Serial killers with military experience: applying learning theory to serial murder
    • Castle T, Hensley C (2002) Serial killers with military experience: applying learning theory to serial murder. International J Offender Ther Comp Criminol 46:453–465
    • (2002) International J Offender Ther Comp Criminol , vol.46 , pp. 453-465
    • Castle, T.1    Hensley, C.2
  • 6
    • 84870548992 scopus 로고    scopus 로고
    • Prototyping a lightweight trust architecture to fight phishing
    • Tech, Rep., final Report
    • Chau D (2005) Prototyping a lightweight trust architecture to fight phishing, MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep., final Report. http://groups.csail.mit.edu/cis/crypto/projects/antiphishing/
    • (2005) MIT Computer Science and Artificial Intelligence Laboratory
    • Chau, D.1
  • 7
    • 0005044188 scopus 로고
    • Profiling: a hidden challenge to the regulation of data surveillance
    • Clark R (1993) Profiling: a hidden challenge to the regulation of data surveillance. J Inf Sci 4(2)
    • (1993) J Inf Sci , vol.4 , Issue.2
    • Clark, R.1
  • 9
    • 85041448118 scopus 로고    scopus 로고
    • Customer profiling survey solution enabling cross and up selling (2007) Confirmit.
    • Customer profiling survey solution enabling cross and up selling (2007) Confirmit. http://www.confirmit.com/home.aspx
  • 11
    • 84898270337 scopus 로고    scopus 로고
    • Online identity theft: Phishing technilogy
    • Radix Labs: Tech. Rep., retrieved from Anti-Phishing Working Group
    • Emigh A (2005) Online identity theft: Phishing technilogy, chokepoints and countermeasures, Radix Labs, Tech. Rep., retrieved from Anti-Phishing Working Group. http://www.antiphishing.org/resources.html
    • (2005) chokepoints and countermeasures
    • Emigh, A.1
  • 12
    • 85041432921 scopus 로고    scopus 로고
    • FBI method of profiling (2006) Wikipedia, January 2006, retrieved June 10, 2011. http://en.wikipedia.org/wiki/FBI_method_of_profiling
    • (2006) Wikipedia, January 2006, retrieved June , vol.10 , Issue.2011
  • 14
    • 0001963082 scopus 로고    scopus 로고
    • A short introduction to boosting
    • Freund Y, Schapire R (1999) A short introduction to boosting, J Jpn Soc Artif Intell 14(5):771–780
    • (1999) J Jpn Soc Artif Intell , vol.14 , Issue.5 , pp. 771-780
    • Freund, Y.1    Schapire, R.2
  • 15
    • 84922187857 scopus 로고    scopus 로고
    • Applying modality and equivalence concepts to pattern finding in social process-produced data
    • Hanneman RA, Shelton CR (2011) Applying modality and equivalence concepts to pattern finding in social process-produced data. Soc Netw Anal Min 1(1):59–72
    • (2011) Soc Netw Anal Min , vol.1 , Issue.1 , pp. 59-72
    • Hanneman, R.A.1    Shelton, C.R.2
  • 17
    • 85041439860 scopus 로고    scopus 로고
    • InterNIC : Whois search InterNIC—Public information Regarding Internel Domain Name Registration Services.
    • InterNIC: Whois search InterNIC—Public information Regarding Internel Domain Name Registration Services. http://www.internic.net/whois.html
  • 19
    • 85041437628 scopus 로고    scopus 로고
    • Distributed phishing attacks, Cryptology ePrint Archive
    • Jakobsson M, Young A (2005) Distributed phishing attacks, Cryptology ePrint Archive, Report 2005/091. http://eprint.iacr.org/
    • (2005) Report , vol.2005
    • Jakobsson, M.1    Young, A.2
  • 20
    • 0038167128 scopus 로고    scopus 로고
    • Learning to classify text using support vector machines: methods
    • Kluwer Academic Publishers, Dordrecht
    • Joachims TJ (2002) Learning to classify text using support vector machines: methods, theory and algorithms. Kluwer Academic Publishers, Dordrecht
    • (2002) theory and algorithms
    • Joachims, T.J.1
  • 22
    • 33845310880 scopus 로고    scopus 로고
    • The study of drug-reaction relationships using global optimization techniques
    • Mammadov M, Rubinov A, Yearwood J (2007a) The study of drug-reaction relationships using global optimization techniques. Optim Methods Softw 22(1):99–126
    • (2007) Optim Methods Softw , vol.22 , Issue.1 , pp. 99-126
    • Mammadov, M.1    Rubinov, A.2    Yearwood, J.3
  • 24
    • 85041445960 scopus 로고    scopus 로고
    • Market basket analysis (2011) Information drivers, retrieved June 10, 2011. http://www.information-drivers.com/market_basket_analysis.php
    • (2011) Information drivers, retrieved June , vol.10 , pp. 2011
  • 25
    • 85041440625 scopus 로고    scopus 로고
    • Analysis of consumer behaviour online, Analogik.com, Tech
    • Petrovic D (2007) Analysis of consumer behaviour online, Analogik.com, Tech. Rep., retrieved June 10, 2011. http://analogik.com/articles/227/analysis-of-consumer-behaviour-online
    • (2007) Rep., retrieved June , vol.10 , Issue.2011
    • Petrovic, D.1
  • 26
    • 85041442273 scopus 로고    scopus 로고
    • Ripe database RIPE Network Coordination Centre.
    • Ripe database RIPE Network Coordination Centre. http://www.ripe.net/index.html
  • 27
    • 84863950364 scopus 로고    scopus 로고
    • Social networks and online environments: when science and practice co-evolve
    • Rosen D, Barnett GA, Kim JH (2011) Social networks and online environments: when science and practice co-evolve. Soc Netw Anal Min 1(1):27–42
    • (2011) Soc Netw Anal Min , vol.1 , Issue.1 , pp. 27-42
    • Rosen, D.1    Barnett, G.A.2    Kim, J.H.3
  • 28
    • 0033905095 scopus 로고    scopus 로고
    • BoosTexter: A boosting-based system for text categorization
    • Schapire R, Singer Y (2000) BoosTexter: a boosting-based system for text categorization. Mach Learn 39(2/3):135–168
    • (2000) Machine Learning , vol.39 , Issue.2-3 , pp. 135-168
    • Schapire, R.1    Singer, Y.2
  • 29
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • Sebastiani F (2002) Machine learning in automated text categorization. IACM Comput Surv (CSUR) 34(1). doi:10.1145/505282.505283
    • (2002) IACM Comput Surv (CSUR) , vol.34 , Issue.1
    • Sebastiani, F.1
  • 32
    • 84947276512 scopus 로고    scopus 로고
    • The APNIC whois Asia Pacific Network Information Center.
    • The APNIC whois Asia Pacific Network Information Center. http://wq.apnic.net/apnic-bin/whois.pl
  • 34
    • 85041432633 scopus 로고    scopus 로고
    • A free and comprehensive guide to the world of forensic psychology
    • Webb D (2011) A free and comprehensive guide to the world of forensic psychology, All About Forensic Psychology, retrieved June, 2011. http://student-guide-to-forensic-psychology.blogspot.com/
    • (2011) All About Forensic Psychology, retrieved June , pp. 2011
    • Webb, D.1
  • 37
    • 70349325096 scopus 로고    scopus 로고
    • Preventing phishing attacks by revealing user intentions
    • In, Symposium on Usable Privacy and Security (SOUPS
    • Wu M, Miller R, Little G (2006) Preventing phishing attacks by revealing user intentions. In: Symposium on Usable Privacy and Security (SOUPS)
    • (2006)
    • Wu, M.1    Miller, R.2    Little, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.