-
1
-
-
84932154932
-
Prediction of phishing websites using classification algorithms based on weight of web pages characteristics
-
Dadkhah M, Jazi M.D, Lyashenko V. Prediction of phishing websites using classification algorithms based on weight of web pages characteristics. Journal of Mathematics and Technology. 2014; 5(2): 24-35. DOI: 10.7813/jmt.2014/5-2/4.
-
(2014)
Journal of Mathematics and Technology
, vol.5
, Issue.2
, pp. 24-35
-
-
Dadkhah, M.1
Jazi, M.D.2
Lyashenko, V.3
-
2
-
-
84870265063
-
Phishing Secrets: History, Effects, and Countermeasures
-
San Martino A, Perramon X. Phishing Secrets: History, Effects, and Countermeasures. International Journal of Network Security. 2010; 11(3): 163-171.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 163-171
-
-
San Martino, A.1
Perramon, X.2
-
3
-
-
84865684041
-
APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach
-
Mahmood M, Rajamani L. APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach. Global Trends in Computing and Communication Systems. 2012; 269; 490-502.
-
(2012)
Global Trends in Computing and Communication Systems
, vol.269
, pp. 490-502
-
-
Mahmood, M.1
Rajamani, L.2
-
4
-
-
72449130877
-
A Novel Anti-Phishing Framework Based on Honeypots
-
Tacoma, WA.
-
Li S, Schmitz R. A Novel Anti-Phishing Framework Based on Honeypots. eCrime Researchers Summit (IEEE). Tacoma, WA. 2009; 1-13. DOI:10.1109/ECRIME.2009.5342609.
-
(2009)
eCrime Researchers Summit (IEEE)
, pp. 1-13
-
-
Li, S.1
Schmitz, R.2
-
8
-
-
84857164924
-
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
-
Schlegel R, Zhang K, Zhou X. Y, Intwala M, Kapadia A, Wang X. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS. 2011; 11: 17-33.
-
(2011)
NDSS
, vol.11
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.Y.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
10
-
-
84856033479
-
The State of Phishing Attacks
-
Hong J. The State of Phishing Attacks. Communications of the ACM. 2012; 55(1): 74-81.
-
(2012)
Communications of the ACM
, vol.55
, Issue.1
, pp. 74-81
-
-
Hong, J.1
-
21
-
-
84932176513
-
An Effective Strategy for Identifying Phishing Websites using Class-Based Approach
-
Ruth Ramya K, Priyanka K, Anusha K, Jyosthna Devi CH, Siva Prasad Y.A. An Effective Strategy for Identifying Phishing Websites using Class-Based Approach. International Journal of Scientific & Engineering Research. 2011; 2(12): 1-7.
-
(2011)
International Journal of Scientific & Engineering Research
, vol.2
, Issue.12
, pp. 1-7
-
-
Ruth Ramya, K.1
Priyanka, K.2
Anusha, K.3
Jyosthna Devi, C.H.4
Siva Prasad, Y.A.5
-
22
-
-
84896890666
-
Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?
-
Jalalian M, Mahboobi H. Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?. Walailak J Sci & Tech. 2014; 11(5): 389-394.
-
(2014)
Walailak J Sci & Tech
, vol.11
, Issue.5
, pp. 389-394
-
-
Jalalian, M.1
Mahboobi, H.2
-
23
-
-
84929462179
-
How Can We Identify Hijacked Journals?
-
Dadkhah M, Obeidat MM, Jazi MD, Sutikno T, Riyadi MA. How Can We Identify Hijacked Journals?. Bulletin of Electrical Engineering and Informatics. 2015; 4(2): 83-87. DOI: 10.12928/eei.v4i2.449.
-
(2015)
Bulletin of Electrical Engineering and Informatics
, vol.4
, Issue.2
, pp. 83-87
-
-
Dadkhah, M.1
Obeidat, M.M.2
Jazi, M.D.3
Sutikno, T.4
Riyadi, M.A.5
-
24
-
-
84907819333
-
Predatory and Fake Scientific Journals/Publishers-A Global Outbreak with Rising Trend: A Review
-
Lukiæ Tin, Blešiæ Ivana, Basarin Biljana, Ivanoviæ Bibiæ Ljubica, Miloševiæ Dragan, Sakulski Dušan. Predatory and Fake Scientific Journals/Publishers-A Global Outbreak with Rising Trend: A Review.Geographica Pannonica. 2014; 18(3): 69-81.
-
(2014)
Geographica Pannonica
, vol.18
, Issue.3
, pp. 69-81
-
-
Tin, L.1
Ivana, B.2
Biljana, B.3
Ljubica, I.B.4
Dragan, M.5
Dušan, S.6
-
25
-
-
84872404765
-
Open Access Initiatives in Africa-Structure, Incentives and Disincentives
-
Nwagwu WE. Open Access Initiatives in Africa-Structure, Incentives and Disincentives. The Journal of Academic Librarianship. 2013; 39(1): 3-10. DOI: 10.1016/j.acalib.2012.11.024.
-
(2013)
The Journal of Academic Librarianship
, vol.39
, Issue.1
, pp. 3-10
-
-
Nwagwu, W.E.1
|