-
1
-
-
67349254877
-
-
Gartner Research, Stamford, CT, USA, Tech. Rep.
-
"Gartner Survey Shows Phishing Attacks Escalated in 2007, " Gartner Research, Stamford, CT, USA, Tech. Rep., 2007.
-
(2007)
Gartner Survey Shows Phishing Attacks Escalated in 2007
-
-
-
2
-
-
79551532513
-
-
Javelin Strategy & Research, Pleasanton, CA, USA, Tech. Rep.
-
"2010 Identity Fraud Survey Report, " Javelin Strategy & Research, Pleasanton, CA, USA, Tech. Rep., 2010.
-
(2010)
2010 Identity Fraud Survey Report
-
-
-
3
-
-
84919911593
-
Phishing: Crime that pays
-
P. J. Nero, B. Wardman, H. Copes, and G. Warner, "Phishing: Crime that pays, " in Proc. eCrime, 2011, pp. 1-10.
-
(2011)
Proc. ECrime
, pp. 1-10
-
-
Nero, P.J.1
Wardman, B.2
Copes, H.3
Warner, G.4
-
4
-
-
80052998524
-
-
Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 1H2014
-
"Global phishing survey: Trends and domain name use, " Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 1H2014, 2014.
-
(2014)
Global Phishing Survey: Trends and Domain Name Use
-
-
-
5
-
-
77957665182
-
-
ICANN Security and Stability Advisory Committee, Los Angeles, CA, USA, Tech. Rep. SAC 025
-
"SSAC advisory on fast flux hosting and DNS, " ICANN Security and Stability Advisory Committee, Los Angeles, CA, USA, Tech. Rep. SAC 025, 2008.
-
(2008)
SSAC Advisory on Fast Flux Hosting and DNS
-
-
-
6
-
-
34548344520
-
-
Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 2nd Quarter 2014
-
"Phishing Activity Trends Report, " Anti-Phishing Working Group, Lexington, MA, USA, Tech. Rep. 2nd Quarter 2014, 2014.
-
(2014)
Phishing Activity Trends Report
-
-
-
7
-
-
84936824188
-
Word association norms, mutual information, and lexicography
-
Mar.
-
K. W. Church and P. Hanks, "Word association norms, mutual information, and lexicography, " Comput. Linguistics, vol. 16, no. 1, pp. 22-29, Mar. 1990.
-
(1990)
Comput. Linguistics
, vol.16
, Issue.1
, pp. 22-29
-
-
Church, K.W.1
Hanks, P.2
-
8
-
-
33847710337
-
The Google similarity distance
-
Mar.
-
R. L. Cilibrasi and P. M. Vitanyi, "The Google similarity distance, " Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 370-383, Mar. 2007.
-
(2007)
Trans. Knowl. Data Eng.
, vol.19
, Issue.3
, pp. 370-383
-
-
Cilibrasi, R.L.1
Vitanyi, P.M.2
-
9
-
-
84885001189
-
Disco: A multilingual database of distributionally similar words
-
P. Kolb, "Disco: A multilingual database of distributionally similar words, " in Proc. KONVENS, 2008, pp. 33-44.
-
(2008)
Proc. KONVENS
, pp. 33-44
-
-
Kolb, P.1
-
10
-
-
84976702763
-
WordNet: A lexical database for English
-
Nov.
-
G. A. Miller, "WordNet: A lexical database for English, " Commun. ACM, vol. 38, no. 11, pp. 39-41, Nov. 1995.
-
(1995)
Commun. ACM
, vol.38
, Issue.11
, pp. 39-41
-
-
Miller, G.A.1
-
11
-
-
84922786055
-
PhishScore: Hacking phishers' minds
-
S. Marchal, J. François, R. State, and T. Engel, "PhishScore: Hacking phishers' minds, " in Proc. 10th Int. CNSM, 2014, pp. 46-54.
-
(2014)
Proc. 10th Int. CNSM
, pp. 46-54
-
-
Marchal, S.1
François, J.2
State, R.3
Engel, T.4
-
14
-
-
85029359239
-
Development of the domain name system
-
P. Mockapetris and K. Dunlap, "Development of the domain name system, " in Proc. ACM SIGCOMM, 1988, pp. 123-133.
-
(1988)
Proc. ACM SIGCOMM
, pp. 123-133
-
-
Mockapetris, P.1
Dunlap, K.2
-
15
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin, "A framework for detection and measurement of phishing attacks, " in Proc. ACM Workshop Recurring Malcode, 2007, pp. 1-8.
-
(2007)
Proc. ACM Workshop Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
17
-
-
84867840107
-
Proactive discovery of phishing related domain names
-
New York, NY, USA: Springer-Verlag
-
S. Marchal, J. François, R. State, and T. Engel, "Proactive discovery of phishing related domain names, " in Research in Attacks, Intrusions, and Defenses. New York, NY, USA: Springer-Verlag, 2012, pp. 190-209.
-
(2012)
Research in Attacks, Intrusions, and Defenses
, pp. 190-209
-
-
Marchal, S.1
François, J.2
State, R.3
Engel, T.4
-
18
-
-
0000600219
-
A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge
-
Apr.
-
T. K. Landauer and S. T. Dumais, "A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge, " Psychological Rev., vol. 104, no. 2, pp. 211-240, Apr. 1997.
-
(1997)
Psychological Rev.
, vol.104
, Issue.2
, pp. 211-240
-
-
Landauer, T.K.1
Dumais, S.T.2
-
19
-
-
84948177273
-
Mining the web for synonyms: PMI-IR versus LSA on TOEFL
-
Springer
-
P. Turney, "Mining the web for synonyms: PMI-IR versus LSA on TOEFL, " in Proc. 12th Eur. Conf. Mach. Learn., 2001, pp. 491-502, Springer.
-
(2001)
Proc. 12th Eur. Conf. Mach. Learn.
, pp. 491-502
-
-
Turney, P.1
-
20
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul.
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
21
-
-
34548799148
-
Improving distributed join efficiency with extended bloom filter operations
-
L. Michael, W. Nejdl, O. Papapetrou, and W. Siberski, "Improving distributed join efficiency with extended bloom filter operations, " in Proc. 21st Int. Conf. Adv. Inf. Netw. Appl., 2007, pp. 187-194.
-
(2007)
Proc. 21st Int. Conf. Adv. Inf. Netw. Appl.
, pp. 187-194
-
-
Michael, L.1
Nejdl, W.2
Papapetrou, O.3
Siberski, W.4
-
22
-
-
84857472534
-
Lexical URL analysis for discriminating phishing and legitimate e-mail messages
-
M. Khonji, Y. Iraqi, and A. Jones, "Lexical URL analysis for discriminating phishing and legitimate e-mail messages, " in Proc. ICITST, 2011, pp. 422-427.
-
(2011)
Proc. ICITST
, pp. 422-427
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
23
-
-
71149108237
-
Identifying suspicious URLs: An application of large-scale online learning
-
ACM
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Identifying suspicious URLs: An application of large-scale online learning, " in Proc. 26th Annu. Int. Conf. Mach. Learn., 2009, pp. 681-688, ACM.
-
(2009)
Proc. 26th Annu. Int. Conf. Mach. Learn.
, pp. 681-688
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
24
-
-
79960861049
-
PhishDef: URL names say it all
-
A. Le, A. Markopoulou, and M. Faloutsos, "PhishDef: URL names say it all, " in Proc. IEEE INFOCOM, 2011, pp. 191-195.
-
(2011)
Proc. IEEE INFOCOM
, pp. 191-195
-
-
Le, A.1
Markopoulou, A.2
Faloutsos, M.3
-
25
-
-
77953329477
-
PhishNet: Predictive blacklisting to detect phishing attacks
-
P. Prakash, M. Kumar, R. Kompella, and M. Gupta, "PhishNet: Predictive blacklisting to detect phishing attacks, " in Proc. IEEE INFOCOM, 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
26
-
-
78650804323
-
Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement
-
Jun.
-
G. Forman and M. Scholz, "Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement, " SIGKDD Exploration Newslett., vol. 12, no. 1, pp. 49-57, Jun. 2010.
-
(2010)
SIGKDD Exploration Newslett.
, vol.12
, Issue.1
, pp. 49-57
-
-
Forman, G.1
Scholz, M.2
-
27
-
-
76749092270
-
The WEKA data mining software: An update
-
Jun.
-
M. Hall et al., "The WEKA data mining software: An update, " ACM SIGKDD Explorations Newslett., vol. 11, no. 1, pp. 10-18, Jun. 2009.
-
(2009)
ACM SIGKDD Explorations Newslett.
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
-
28
-
-
0035478854
-
Random forests
-
Oct.
-
L. Breiman, "Random forests, " Mach. Learn., vol. 45, no. 1, pp. 5-32, Oct. 2001.
-
(2001)
Mach. Learn.
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
29
-
-
84867774439
-
Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
-
Oct.
-
S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, "Detecting algorithmically generated domain-flux attacks with DNS traffic analysis, " IEEE/ACM Trans. Netw., vol. 20, no. 5, pp. 1663-1677, Oct. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.5
, pp. 1663-1677
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
-
30
-
-
77953636660
-
Detecting visually similar web pages: Application to phishing detection
-
May
-
T.-C. Chen, S. Dick, and J. Miller, "Detecting visually similar web pages: Application to phishing detection, " ACM Trans. Internet Technol., vol. 10, no. 2, pp. 1-38, May 2010.
-
(2010)
ACM Trans. Internet Technol.
, vol.10
, Issue.2
, pp. 1-38
-
-
Chen, T.-C.1
Dick, S.2
Miller, J.3
-
31
-
-
70249114141
-
Visual-similarity-based phishing detection
-
ACM
-
E. Medvet, E. Kirda, and C. Kruegel, "Visual-similarity-based phishing detection, " in Proc. 4th Int. Conf. Security Privacy Commun. Netw., 2008, pp. 1-6, ACM.
-
(2008)
Proc. 4th Int. Conf. Security Privacy Commun. Netw.
, pp. 1-6
-
-
Medvet, E.1
Kirda, E.2
Kruegel, C.3
-
32
-
-
84865616735
-
A hybrid phish detection approach by identity discovery and keywords retrieval
-
ACM
-
G. Xiang and J. I. Hong, "A hybrid phish detection approach by identity discovery and keywords retrieval, " in Proc. 18th Int. Conf. World Wide We b, 2009, pp. 571-580, ACM.
-
(2009)
Proc. 18th Int. Conf. World Wide Web
, pp. 571-580
-
-
Xiang, G.1
Hong, J.I.2
-
33
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
ACM
-
Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: A content-based approach to detecting phishing web sites, " in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 639-648, ACM.
-
(2007)
Proc. 16th Int. Conf. World Wide Web
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
34
-
-
84900297126
-
An anti-phishing system employing diffused information
-
Apr.
-
T.-C. Chen, T. Stepan, S. Dick, and J. Miller, "An anti-phishing system employing diffused information, " ACM Trans. Inf. Syst. Security, vol. 16, no. 4, pp. 1-31, Apr. 2014.
-
(2014)
ACM Trans. Inf. Syst. Security
, vol.16
, Issue.4
, pp. 1-31
-
-
Chen, T.-C.1
Stepan, T.2
Dick, S.3
Miller, J.4
-
35
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a dynamic reputation system for DNS, " in Proc. 19th Usenix Security Symp., 2010, pp. 18-18.
-
(2010)
Proc. 19th Usenix Security Symp.
, pp. 18-18
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
36
-
-
84919915526
-
-
Apr.
-
L. Bilge, S. Sen, D. Balzarotti, E. Kirda, and C. Kruegel, "Exposure: A passive DNS analysis service to detect and report malicious domains, " vol. 16, no. 4, pp. 1-28, Apr. 2014.
-
(2014)
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
, vol.16
, Issue.4
, pp. 1-28
-
-
Bilge, L.1
Sen, S.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
37
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
ACM
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: Learning to detect malicious web sites from suspicious URLs, " in Proc. 15th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2009, pp. 1245-1254, ACM.
-
(2009)
Proc. 15th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
38
-
-
85077707798
-
Highly predictive blacklisting
-
USENIX Association
-
J. Zhang, P. Porras, and J. Ullrich, "Highly predictive blacklisting, " in Proc. 17th Conf. Security Symp., 2008, pp. 107-122, USENIX Association.
-
(2008)
Proc. 17th Conf. Security Symp.
, pp. 107-122
-
-
Zhang, J.1
Porras, P.2
Ullrich, J.3
-
39
-
-
84909631007
-
Intelligent phish-ing detection parameter framework for e-banking transactions based on neuro-fuzzy
-
P. Barraclough, G. Sexton, M. Hossain, and N. Aslam, "Intelligent phish-ing detection parameter framework for e-banking transactions based on neuro-fuzzy, " in Proc. SAI, 2014, pp. 545-555.
-
(2014)
Proc. SAI
, pp. 545-555
-
-
Barraclough, P.1
Sexton, G.2
Hossain, M.3
Aslam, N.4
-
40
-
-
84862993100
-
Parsing and detecting phishing pages based on semantic understanding of text
-
J. Zhang et al., "Parsing and detecting phishing pages based on semantic understanding of text, " J. Inf. & Comput. Sci., vol. 9, no. 6, pp. 1521-1534, 2012.
-
(2012)
J. Inf. & Comput. Sci.
, vol.9
, Issue.6
, pp. 1521-1534
-
-
Zhang, J.1
-
41
-
-
84874664509
-
PhishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
-
Mar.
-
V. Ramanathan and H. Wechsler, "phishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training, " EURASIP J. Multimedia Inf. Security, vol. 2012, no. 1, pp. 1-22, Mar. 2012.
-
(2012)
EURASIP J. Multimedia Inf. Security
, vol.2012
, Issue.1
, pp. 1-22
-
-
Ramanathan, V.1
Wechsler, H.2
-
42
-
-
84874075443
-
Semantic based DNS forensics
-
S. Marchal, J. François, R. State, and T. Engel, "Semantic based DNS forensics, " in Proc. IEEE Int. WIFS, 2012, pp. 91-96.
-
(2012)
Proc. IEEE Int. WIFS
, pp. 91-96
-
-
Marchal, S.1
François, J.2
State, R.3
Engel, T.4
-
43
-
-
84875605043
-
PhishLive: A view of phishing and malware attacks from an edge router
-
Springer-Verlag
-
L. Cao, T. Probst, and R. Kompella, "PhishLive: A view of phishing and malware attacks from an edge router, " in Proc. 14th Int. Conf. Passive Active Meas.-PAM, 2013, pp. 239-249, Springer-Verlag.
-
(2013)
Proc. 14th Int. Conf. Passive Active Meas.-PAM
, pp. 239-249
-
-
Cao, L.1
Probst, T.2
Kompella, R.3
-
44
-
-
84898986956
-
PhishSafe: Leveraging modern JavaScript API's for transparent and robust protection
-
ACM
-
B. Braun, M. Johns, J. Koestler, and J. Posegga, "PhishSafe: Leveraging modern JavaScript API's for transparent and robust protection, " in Proc. 4th ACM Conf. Data Appl. Security Privacy-CODASPY, 2014, pp. 61-72, ACM.
-
(2014)
Proc. 4th ACM Conf. Data Appl. Security Privacy-CODASPY
, pp. 61-72
-
-
Braun, B.1
Johns, M.2
Koestler, J.3
Posegga, J.4
-
45
-
-
84873585431
-
Survey on web spam detection: Principles and algorithms
-
Dec.
-
N. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms, " SIGKDD Exploration Newslett., vol. 13, no. 2, pp. 50-64, Dec. 2012.
-
(2012)
SIGKDD Exploration Newslett.
, vol.13
, Issue.2
, pp. 50-64
-
-
Spirin, N.1
Han, J.2
-
47
-
-
60549098239
-
Detecting influenza epidemics using search engine query data
-
J. Ginsberg et al., "Detecting influenza epidemics using search engine query data, " Nature, vol. 457, no. 7232, pp. 1012-1014, 2008.
-
(2008)
Nature
, vol.457
, Issue.7232
, pp. 1012-1014
-
-
Ginsberg, J.1
-
48
-
-
84871191904
-
Detecting and tracking topics and events from web search logs
-
Nov.
-
H. Liu, J. He, Y. Gu, H. Xiong, and X. Du, "Detecting and tracking topics and events from web search logs, " ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 21:1-21:29, Nov. 2012.
-
(2012)
ACM Trans. Inf. Syst.
, vol.30
, Issue.4
, pp. 2101-2129
-
-
Liu, H.1
He, J.2
Gu, Y.3
Xiong, H.4
Du, X.5
|