-
2
-
-
79551532513
-
-
Javelin Strategy &Research, Tech. Rep
-
"2010 Identity Fraud Survey Report, " Javelin Strategy &Research, Tech. Rep., 2010.
-
(2010)
2010 Identity Fraud Survey Report
-
-
-
4
-
-
84922113565
-
-
APWG, Tech. Rep. 3rd Quarter2012
-
"Phishing Activity Trends Report, " APWG, Tech. Rep. 3rd Quarter 2012, 2013.
-
(2013)
Phishing Activity Trends Report
-
-
-
5
-
-
84936824188
-
Word association norms, mutual information, and lexicography
-
K. W. Church and P. Hanks, "Word association norms, mutual information, and lexicography, " Computational linguistics, vol. 16, no. 1, pp. 22-29, 1990.
-
(1990)
Computational Linguistics
, vol.16
, Issue.1
, pp. 22-29
-
-
Church, K.W.1
Hanks, P.2
-
6
-
-
33847710337
-
The Google similarity distance
-
R. L. Cilibrasi and P. M. Vitanyi, "The Google similarity distance, " Knowledge and Data Engineering, IEEE Transactions on, vol. 19, no. 3, pp. 370-383, 2007.
-
(2007)
Knowledge and Data Engineering, IEEE Transactions on
, vol.19
, Issue.3
, pp. 370-383
-
-
Cilibrasi, R.L.1
Vitanyi, P.M.2
-
7
-
-
84885001189
-
Disco: A multilingual database of distributionally similar words
-
P. Kolb, "Disco: A multilingual database of distributionally similar words, " in Proceedings of KONVENS-2008, 2008.
-
(2008)
Proceedings of KONVENS-2008
-
-
Kolb, P.1
-
8
-
-
84976702763
-
Wordnet: A lexical database for english
-
G. A. Miller et al., "Wordnet: a lexical database for english, " Communications of the ACM, vol. 38, no. 11, pp. 39-41, 1995.
-
(1995)
Communications of the ACM
, vol.38
, Issue.11
, pp. 39-41
-
-
Miller, G.A.1
-
12
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin, "A framework for detection and measurement of phishing attacks, " in Proceedings of the 2007 ACM workshop on recurring malcode. ACM, 2007, pp. 1-8.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode. ACM
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
14
-
-
84867840107
-
Proactive discovery of phishing related domain names
-
Springer
-
S. Marchal, J. Francois, R. State, and T. Engel, "Proactive discovery of phishing related domain names, " in Research in Attacks, Intrusions, and Defenses. Springer, 2012, pp. 190-209.
-
(2012)
Research in Attacks, Intrusions, and Defenses
, pp. 190-209
-
-
Marchal, S.1
Francois, J.2
State, R.3
Engel, T.4
-
15
-
-
0000600219
-
A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge
-
T. K. Landauer and S. T. Dumais, "A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge, " Psychological Review; Psychological Review, vol. 104, no. 2, p. 211, 1997.
-
(1997)
Psychological Review; Psychological Review
, vol.104
, Issue.2
, pp. 211
-
-
Landauer, T.K.1
Dumais, S.T.2
-
16
-
-
84857472534
-
Lexical url analysis for discriminating phishing and legitimate e-mail messages
-
M. Khonji, Y. Iraqi, and A. Jones, "Lexical url analysis for discriminating phishing and legitimate e-mail messages, " in 2011 International Conference for Internet Technology and Secured Transactions (ICITST), 2011, pp. 422-427.
-
(2011)
2011 International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 422-427
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
17
-
-
71149108237
-
Identifying suspicious URLs: An application of large-scale online learning
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Identifying suspicious URLs: an application of large-scale online learning, " in Proceedings of the 26th Annual International Conference on Machine Learning. ACM, 2009, pp. 681-688.
-
(2009)
Proceedings of the 26th Annual International Conference on Machine Learning. ACM
, pp. 681-688
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
18
-
-
79960861049
-
Phishdef: URL names say it all
-
A. Le, A. Markopoulou, and M. Faloutsos, "Phishdef: URL names say it all, " in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 191-195.
-
(2011)
INFOCOM, 2011 Proceedings IEEE. IEEE
, pp. 191-195
-
-
Le, A.1
Markopoulou, A.2
Faloutsos, M.3
-
19
-
-
77953329477
-
Phishnet: Predictive blacklisting to detect phishing attacks
-
P. Prakash, M. Kumar, R. Kompella, and M. Gupta, "Phishnet: predictive blacklisting to detect phishing attacks, " in Proceedings of INFOCOM. IEEE, 2010, pp. 1-5.
-
(2010)
Proceedings of INFOCOM. IEEE
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
20
-
-
78650804323
-
Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement
-
G. Forman and M. Scholz, "Apples-to-apples in cross-validation studies: Pitfalls in classifier performance measurement, " SIGKDD Explor. Newsl., vol. 12, no. 1, pp. 49-57, 2010.
-
(2010)
SIGKDD Explor. Newsl
, vol.12
, Issue.1
, pp. 49-57
-
-
Forman, G.1
Scholz, M.2
-
21
-
-
76749092270
-
The WEKA data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update, " ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
22
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests, " Machine learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
23
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names, " in Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, ser. IMC '10. ACM, 2010.
-
(2010)
Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, Ser. IMC '10. ACM
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
-
24
-
-
77953636660
-
Detecting visually similar web pages: Application to phishing detection
-
T.-C. Chen, S. Dick, and J. Miller, "Detecting visually similar web pages: Application to phishing detection, " ACM Transactions on Internet Technology, vol. 10, no. 2, 2010.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.2
-
-
Chen, T.-C.1
Dick, S.2
Miller, J.3
-
25
-
-
70249114141
-
Visual-similarity-based phishing detection
-
E. Medvet, E. Kirda, and C. Kruegel, "Visual-similarity-based phishing detection, " in Proceedings of the 4th international conference on security and privacy in communication netowrks. ACM, 2008, p. 22.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM
, pp. 22
-
-
Medvet, E.1
Kirda, E.2
Kruegel, C.3
-
27
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites, " in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, pp. 639-648.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web. ACM
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
28
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a dynamic reputation system for DNS, " in 19th Usenix Security Symposium, 2010.
-
(2010)
19th Usenix Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
29
-
-
84922594806
-
Exposure: Finding malicious domains using passive DNS analysis
-
L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, "Exposure: Finding malicious domains using passive DNS analysis, " in Proceedings of NDSS, 2011.
-
(2011)
Proceedings of NDSS
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
30
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious urls, " in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
32
-
-
84862993100
-
Parsing and detecting phishing pages based on semantic understanding of text
-
J. Zhang, Q. Li, Q. Wang, T. Geng, X. Ouyang, and Y. Xin, "Parsing and detecting phishing pages based on semantic understanding of text, " Journal of Information &Computational Science, no. 9, pp. 1521-1534, 2012.
-
(2012)
Journal of Information &Computational Science
, Issue.9
, pp. 1521-1534
-
-
Zhang, J.1
Li, Q.2
Wang, Q.3
Geng, T.4
Ouyang, X.5
Xin, Y.6
-
33
-
-
84874664509
-
PhishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training
-
V. Ramanathan and H. Wechsler, "phishGILLNET phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training, " EURASIP Journal on Multimedia and Information Security, vol. 2012, no. 1, pp. 1-22, 2012.
-
(2012)
EURASIP Journal on Multimedia and Information Security
, vol.2012
, Issue.1
, pp. 1-22
-
-
Ramanathan, V.1
Wechsler, H.2
-
34
-
-
78651431906
-
Discovering trends in software engineering with Google Trend
-
J. Rech, "Discovering trends in software engineering with Google Trend, " ACM SIGSOFT Software Engineering Notes, vol. 32, no. 2, pp. 1-2, 2007.
-
(2007)
ACM SIGSOFT Software Engineering Notes
, vol.32
, Issue.2
, pp. 1-2
-
-
Rech, J.1
-
35
-
-
60549098239
-
Detecting influenza epidemics using search engine query data
-
J. Ginsberg, M. H. Mohebbi, R. S. Patel, L. Brammer, M. S. Smolinski, and L. Brilliant, "Detecting influenza epidemics using search engine query data, " Nature, vol. 457, no. 7232, pp. 1012-1014, 2008.
-
(2008)
Nature
, vol.457
, Issue.7232
, pp. 1012-1014
-
-
Ginsberg, J.1
Mohebbi, M.H.2
Patel, R.S.3
Brammer, L.4
Smolinski, M.S.5
Brilliant, L.6
-
36
-
-
84871191904
-
Detecting and tracking topics and events from web search logs
-
Nov
-
H. Liu, J. He, Y. Gu, H. Xiong, and X. Du, "Detecting and tracking topics and events from web search logs, " ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 21:1-21:29, Nov. 2012.
-
(2012)
ACM Trans. Inf. Syst
, vol.30
, Issue.4
, pp. 211-2129
-
-
Liu, H.1
He, J.2
Gu, Y.3
Xiong, H.4
Du, X.5
|