-
2
-
-
85019325318
-
Distatis: The analysis of multiple distance matrices
-
June
-
H. Abdi, A. O'Toole, D. Valentin, and B. Edelman. Distatis: The analysis of multiple distance matrices. In Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on, pages 42-42, June 2005
-
(2005)
Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on
, pp. 42-42
-
-
Abdi, H.1
O'Toole, A.2
Valentin, D.3
Edelman, B.4
-
3
-
-
84856764188
-
Statis and distatis: Optimum multitable principal component analysis and three way metric multidimensional scaling
-
H. Abdi, L. J. Williams, D. Valentin, and M. Bennani-Dosse. Statis and distatis: optimum multitable principal component analysis and three way metric multidimensional scaling. Wiley Interdisciplinary Reviews: Computational Statistics, 4(2):124-167, 2012
-
(2012)
Wiley Interdisciplinary Reviews: Computational Statistics
, vol.4
, Issue.2
, pp. 124-167
-
-
Abdi, H.1
Williams, L.J.2
Valentin, D.3
Bennani-Dosse, M.4
-
4
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Berkeley, CA, USA, 2007. USENIX Association
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet scam hosting infrastructure. In Proceedings of 16th USENIX Security Symposium, pages 10:1-10:14, Berkeley, CA, USA, 2007. USENIX Association
-
Proceedings of 16th USENIX Security Symposium
, pp. 101-1014
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
5
-
-
0036866270
-
A combination scheme for fuzzy clustering
-
E. Dimitriadou, A. Weingessel, and K. Hornik. A combination scheme for fuzzy clustering. International Journal of Pattern Recognition and Artificial Intelligence, 16(07):901-912, 2002
-
(2002)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.16
, Issue.7
, pp. 901-912
-
-
Dimitriadou, E.1
Weingessel, A.2
Hornik, K.3
-
7
-
-
0003228903
-
Nonlinear programming: Sequential unconstrained minimization techniques
-
A. V. Fiacco and G. P. McCormick. Nonlinear programming: sequential unconstrained minimization techniques. Number 4. Siam, 1990
-
(1990)
Siam
, Issue.4
-
-
Fiacco, A.V.1
McCormick, G.P.2
-
8
-
-
67249093944
-
Evaluating a trial deployment of password re-use for phishing prevention
-
New York, NY, USA,ACM
-
D. Florencio and C. Herley. Evaluating a trial deployment of password re-use for phishing prevention. In Second APWG eCrime Researchers Summit, eCrime '07, pages 26-36, New York, NY, USA, 2007. ACM
-
(2007)
Second APWG ECrime Researchers Summit, ECrime '07
, pp. 26-36
-
-
Florencio, D.1
Herley, C.2
-
9
-
-
0035534931
-
Fuzzy partition models for fitting a set of partitions
-
A. Gordon and M. Vichi. Fuzzy partition models for fitting a set of partitions. Psychometrika, 66(2):229-247, 2001
-
(2001)
Psychometrika
, vol.66
, Issue.2
, pp. 229-247
-
-
Gordon, A.1
Vichi, M.2
-
11
-
-
0014129195
-
Hierarchical clustering schemes
-
S. C. Johnson. Hierarchical clustering schemes. Psychometrika, 32(3):241-254, 1967
-
(1967)
Psychometrika
, vol.32
, Issue.3
, pp. 241-254
-
-
Johnson, S.C.1
-
12
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, Oct.
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2008
-
(2008)
Conference on Computer and Communications Security (CCS)
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
14
-
-
84939513214
-
Data analysis and decision support, studies in classification
-
Springer Berlin Heidelberg
-
S. Krolak-Schwerdt. Three-way multidimensional scaling: Formal properties and relationships between scaling methods. In D. Baier, R. Decker, and L. Schmidt-Thieme, editors, Data Analysis and Decision Support, Studies in Classification, Data Analysis, and Knowledge Organization, pages 82-90. Springer Berlin Heidelberg, 2005
-
(2005)
Data Analysis, and Knowledge Organization
, pp. 82-90
-
-
Krolak-Schwerdt, S.1
Decker, R.2
Schmidt-Thieme, L.3
-
15
-
-
40049099114
-
Defining clusters from a hierarchical cluster tree
-
Mar.
-
P. Langfelder, B. Zhang, and S. Horvath. Defining clusters from a hierarchical cluster tree. Bioinformatics, 24(5):719-720, Mar. 2008
-
(2008)
Bioinformatics
, vol.24
, Issue.5
, pp. 719-720
-
-
Langfelder, P.1
Zhang, B.2
Horvath, S.3
-
16
-
-
79952527132
-
Automatically determining phishing campaigns using the uscap methodology
-
Oct
-
R. Layton, P. Watters, and R. Dazeley. Automatically determining phishing campaigns using the uscap methodology. In eCrime Researchers Summit (eCrime), 2010, pages 1-8, Oct 2010
-
(2010)
ECrime Researchers Summit (ECrime)
, pp. 1-8
-
-
Layton, R.1
Watters, P.2
Dazeley, R.3
-
18
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Washington, DC, USA, 2011. IEEE Computer Society
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, pages 431-446, Washington, DC, USA, 2011. IEEE Computer Society
-
Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11
, pp. 431-446
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
19
-
-
60349123688
-
Detection of cloaked web spam by using tag-based methods
-
May
-
J.-L. Lin. Detection of cloaked web spam by using tag-based methods. Expert Syst. Appl., 36(4):7493-7499, May 2009. Available at http://dx. doi. org/10. 1016/j. eswa. 2008. 09. 056
-
(2009)
Expert Syst. Appl
, vol.36
, Issue.4
, pp. 7493-7499
-
-
Lin, J.-L.1
-
20
-
-
51149115237
-
Examining the impact of website take-down on phishing
-
Pittsburgh, PA, Oct,ACM
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In Second APWG eCrime Researchers Summit, eCrime '07, Pittsburgh, PA, Oct. 2007. ACM
-
(2007)
Second APWG ECrime Researchers Summit, ECrime '07
-
-
Moore, T.1
Clayton, R.2
-
22
-
-
84865812175
-
The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs
-
A. D. Keromytis, editor,Springer
-
T. Moore, J. Han, and R. Clayton. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In A. D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 41-56. Springer, 2012
-
(2012)
Financial Cryptography, Volume 7397 of Lecture Notes in Computer Science
, pp. 41-56
-
-
Moore, T.1
Han, J.2
Clayton, R.3
-
24
-
-
84950632109
-
Objective criteria for the evaluation of clustering methods
-
W. M. Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical Association, 66(336):846-850, 1971
-
(1971)
Journal of the American Statistical Association
, vol.66
, Issue.336
, pp. 846-850
-
-
Rand, W.M.1
-
25
-
-
40949104348
-
Tracking web spam with HTML style similarities
-
Mar.
-
T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking web spam with html style similarities. ACM Trans. Web, 2(1):3:1-3:28, Mar. 2008
-
(2008)
ACM Trans. Web
, vol.2
, Issue.1
, pp. 31-328
-
-
Urvoy, T.1
Chauveau, E.2
Filoche, P.3
Lavergne, T.4
-
26
-
-
80755187795
-
Cloak and dagger: Dynamics of web search cloaking
-
New York, NY, USA,ACM
-
D. Y. Wang, S. Savage, and G. M. Voelker. Cloak and dagger: dynamics of web search cloaking. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 477-490, New York, NY, USA, 2011. ACM. Available at http://doi. Acm. org/10. 1145/ 2046707. 2046763
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 477-490
-
-
Wang, D.Y.1
Savage, S.2
Voelker, G.M.3
-
27
-
-
67249152321
-
Automating phishing website identification through deep MD5 matching
-
IEEE
-
B. Wardman and G. Warner. Automating phishing website identification through deep MD5 matching. In eCrime Researchers Summit, 2008, pages 1-7. IEEE, 2008.
-
(2008)
ECrime Researchers Summit
, pp. 1-7
-
-
Wardman, B.1
Warner, G.2
|