-
1
-
-
84876048827
-
Deception crimes drive small increase in card fraud and online banking fraud losses
-
Accessed 24. 7. 2013
-
Financial Fraud Action UK, Cheque &Credit clearing Company, UKCARDS Association. Deception crimes drive small increase in card fraud and online banking fraud losses. Press Release, pp. 2, 2012[online] www. financialfraudaction. org. uk. Accessed 24. 7. 2013.
-
(2012)
Press Release
, pp. 2
-
-
Financial, F.A.U.K.1
-
2
-
-
72349089708
-
Modelling intelligent phishing detection system for e-banking using fuzzy data mining
-
M. Aburrous, M. A. Hossain, K. Dahal, and F. Thabtah, "Modelling Intelligent Phishing Detection System for e-Banking using Fuzzy data Mining, " International, 2009.
-
(2009)
International
-
-
Aburrous, M.1
Hossain, M.A.2
Dahal, K.3
Thabtah, F.4
-
4
-
-
84909600918
-
Modelling content from humanverified blacklist for accurate zero-hour phish detection
-
G. Xiang, B. A. Pendleton, J. Hong, "Modelling content from humanverified blacklist for accurate zero-hour phish detection, " probabilistic approach for zero hour phish detection, In Proceedings of the 15th European, 2009.
-
(2009)
Probabilistic Approach for Zero Hour Phish Detection, in Proceedings of the 15th European
-
-
Xiang, G.1
Pendleton, B.A.2
Hong, J.3
-
5
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
Paris, France
-
J. Ma, L. Saul, S. Savag, G. Voelker, "Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, " Proc. of the 15th International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 1245-1254, 2009.
-
(2009)
Proc. of the 15th International Conference on Knowledge Discovery and Data Mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.2
Savag, S.3
Voelker, G.4
-
6
-
-
84909600917
-
-
PhishTank Site Checker (2013), GS! Networks Accessed 22. 2. 2014
-
PhishTank Site Checker (2013), GS! Networks, [online] https: //addons. mozilla. org/en-US/firefox/addon/phishtanksitechecker/ reviews/ Accessed 22. 2. 2014.
-
-
-
-
8
-
-
84904793179
-
An empirical analysis of phishing blacklists
-
S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, C. Zhang, "An empirical analysis of phishing blacklists" in Proceedings of the 6thConference on Email and Anti-Spam, 2009.
-
(2009)
Proceedings of the 6thConference on Email and Anti-Spam
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
-
9
-
-
0027601884
-
ANFIS: Adaptive-network-based fuzzy inference system
-
J. S. R. Jang, "ANFIS: Adaptive-network-based fuzzy inference system. IEEE, ". Transactions on systems, MAN, and Cybernetics, Vol. 23, No. 3, 1993.
-
(1993)
IEEE Transactions on Systems, MAN, and Cybernetics
, vol.23
, Issue.3
-
-
Jang, J.S.R.1
-
10
-
-
84909600915
-
-
European Union Agency for Network and Information Security (ENISA), (2005-2014), [Online] Accessed 20. 1. 2014
-
European Union Agency for Network and Information Security (ENISA), (2005-2014), [Online] https: //www. enisa. europa. eu/aboutenisa Accessed 20. 1. 2014.
-
-
-
-
11
-
-
70350662961
-
An integrated approach to detect phishing mail attacks a case study
-
north Cyprus, Turkey, October, 6-10
-
R. Suriya, K. Saravanan, A. Thangavelu, "An integrated approach to detect phishing mail attacks a case study, " SIN Proceedings of the 2nd international conference on Security of information and networks, north Cyprus, Turkey, October 2009, 6-10, pp. 193-199, vol. 3 ACM New York.
-
(2009)
SIN Proceedings of the 2nd International Conference on Security of Information and Networks
, vol.3
, pp. 193-199
-
-
Suriya, R.1
Saravanan, K.2
Thangavelu, A.3
-
12
-
-
70449526286
-
Discovering phishing target based on semantic link network
-
March
-
L. Wenyin, N. Fang, X. Quan, B. Qiu, G. Liu, "Discovering Phishing Target based on Semantic Link Network, " Future Generation Computer Systems, Elsevier, Volume 26, Issue 3, March 2010, pp. 381-388.
-
(2010)
Future Generation Computer Systems, Elsevier
, vol.26
, Issue.3
, pp. 381-388
-
-
Wenyin, L.1
Fang, N.2
Quan, X.3
Qiu, B.4
Liu, G.5
-
13
-
-
78049413997
-
A hierarchical adaptive
-
G. Xiang, B. A. Pendleton, J. I. Hong, C. P. Rose, "A hierarchical adaptive, " Symposium on Research in Computer Security (ESORICS'10). 268-285, 2010.
-
(2010)
Symposium on Research in Computer Security (ESORICS'10)
, pp. 268-285
-
-
Xiang, G.1
Pendleton, B.A.2
Hong, J.I.3
Rose, C.P.4
-
14
-
-
77957939934
-
Defending the weakest link: Phishing website detection by analysing user behaviours
-
X. Dong, J. A. Clerk, J. L. Jacob, "Defending the weakest link: Phishing Website Detection by analysing User Behaviours, " IEEE Telecommun System, 45: pp. 215-226, 2010.
-
(2010)
IEEE Telecommun System
, vol.45
, pp. 215-226
-
-
Dong, X.1
Clerk, J.A.2
Jacob, J.L.3
-
15
-
-
84858732765
-
High-performance content-based phishing attack detection
-
Conference: 7-9 Nov., San Diego, CA
-
B. Wardman, T. Stallings, G. Warner, A. Skjellum, "High-Performance Content-Based Phishing Attack Detection, " eCrime Researchers Summit (eCrime), pp. 1-9, Conference: 7-9 Nov. 201 1, San Diego, CA.
-
(2011)
ECrime Researchers Summit (ECrime)
, pp. 1-9
-
-
Wardman, B.1
Stallings, T.2
Warner, G.3
Skjellum, A.4
-
16
-
-
84876040032
-
Intelligent phishing detection and protection scheme for online transactions
-
A. P. Barraclough, M. A. Hossain, M. A. Tahir, G. Sexton, N. Aslam "Intelligent phishing detection and protection scheme for online transactions, " Expert Systems with Application 40, pp. 4697-4706, 2013.
-
(2013)
Expert Systems with Application
, vol.40
, pp. 4697-4706
-
-
Barraclough, A.P.1
Hossain, M.A.2
Tahir, M.A.3
Sexton, G.4
Aslam, N.5
-
17
-
-
79960861049
-
Phishdef: Url names say it all
-
A. Le, A. Markopoulou, M. Faloutsos, "Phishdef: Url names say it all, " INFOCOM, Proceedings IEEE, pp. 191-195, 2010.
-
(2010)
INFOCOM, Proceedings IEEE
, pp. 191-195
-
-
Le, A.1
Markopoulou, A.2
Faloutsos, M.3
-
19
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
D. Canali, M, Cova, G. Vigna, C. Krugel "Prophiler: A fast filter for the large-scale detection of malicious web pages, " In Proceedings of the International World Wide Web Conference., 2011.
-
(2011)
Proceedings of the International World Wide Web Conference
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Krugel, C.4
-
20
-
-
81855218311
-
Cantina+: A feature-rich machine learning framework for detecting phishing web sites
-
G. Xiang, J. Hong, C. P. Rose, L. Cranor, " Cantina+: A feature-rich machine learning framework for detecting phishing web sites, " ACM Transactions on Information and System Security (TISSEC), 14(2), pp. 2-21, 2011.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.2
, pp. 2-21
-
-
Xiang, G.1
Hong, J.2
Rose, C.P.3
Cranor, L.4
-
21
-
-
84909647204
-
Adaptive fuzzy classification-rule algorithm in detection malicious web sites from suspicious urls
-
W. Ead, W. Abdelwahed, H. Abdul-Kader, "Adaptive Fuzzy Classification-Rule Algorithm in Detection Malicious Web Sites from Suspicious URLS, " International Arab Journal of e-Technology 3 (1), pp. 1-9, 2013.
-
(2013)
International Arab Journal of E-Technology
, vol.3
, Issue.1
, pp. 1-9
-
-
Ead, W.1
Abdelwahed, W.2
Abdul-Kader, H.3
-
24
-
-
70349274200
-
A new approach of adaptive network-based fuzzy inference system modelling in laser processing a graphical user interface (gui) based
-
P. B. Sivarao, N. S. M. El-Tayeb, "A New Approach of Adaptive Network-Based Fuzzy Inference System Modelling in Laser Processing A Graphical User Interface (GUI) Based, " Journal of Computer Science. 5 (10), pp. 704-710, 2009.
-
(2009)
Journal of Computer Science
, vol.5
, Issue.10
, pp. 704-710
-
-
Sivarao, P.B.1
El-Tayeb, N.S.M.2
-
25
-
-
84909600913
-
-
Complying with anti-phishing regulation (2012)
-
Complying with anti-phishing regulation (2012) http: //help. wildapricot. com/display/DOC/Complying+with+antispam+ regulations
-
-
-
-
26
-
-
84909600912
-
-
PhishTank Join the fight against phishing 2012. [online] Accessed 5. 7. 2013 and 10. 7. 2013
-
PhishTank, "Join the fight against phishing, " 2012. [online] http: //www. phishtank. com/ Accessed 5. 7. 2013 and 10. 7. 2013.
-
-
-
-
27
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
Pittsburgh, PA, Oct
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A Comparison of Machine Learning Techniques for Phishing Detection". In Proceedings of the Anti-Phishing Working Group eCrime Researchers Summit, Pittsburgh, PA, Oct. 2007.
-
(2007)
Proceedings of the Anti-Phishing Working Group ECrime Researchers Summit
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
30
-
-
77957844743
-
Intelligent phishing detection system for e-banking using fuzzy data mining
-
M. Aburrous, M. A. Hossain, K. Dahal and F. Thabtah "Intelligent phishing detection system for e-banking using fuzzy data mining, "Expert Systems with Applications 37, pp. 7913-7921, 2010
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 7913-7921
-
-
Aburrous, M.1
Hossain, M.A.2
Dahal, K.3
Thabtah, F.4
|