메뉴 건너뛰기




Volumn 2014-January, Issue , 2014, Pages 116-123

Automatic identification of replicated criminal websites using combined clustering

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; CLUSTER ANALYSIS; COMPUTER CRIME; COMPUTER PRIVACY; CRIME; INVESTMENTS;

EID: 84939515921     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPW.2014.26     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 4
  • 7
    • 0003228903 scopus 로고
    • Nonlinear programming: Sequential unconstrained minimization techniques
    • A. V. Fiacco and G. P. McCormick. Nonlinear programming: sequential unconstrained minimization techniques. Number 4. Siam, 1990
    • (1990) Siam , Issue.4
    • Fiacco, A.V.1    McCormick, G.P.2
  • 8
    • 67249093944 scopus 로고    scopus 로고
    • Evaluating a trial deployment of password re-use for phishing prevention
    • New York, NY, USA,ACM
    • D. Florencio and C. Herley. Evaluating a trial deployment of password re-use for phishing prevention. In Second APWG eCrime Researchers Summit, eCrime '07, pages 26-36, New York, NY, USA, 2007. ACM
    • (2007) Second APWG ECrime Researchers Summit, ECrime '07 , pp. 26-36
    • Florencio, D.1    Herley, C.2
  • 9
    • 0035534931 scopus 로고    scopus 로고
    • Fuzzy partition models for fitting a set of partitions
    • A. Gordon and M. Vichi. Fuzzy partition models for fitting a set of partitions. Psychometrika, 66(2):229-247, 2001
    • (2001) Psychometrika , vol.66 , Issue.2 , pp. 229-247
    • Gordon, A.1    Vichi, M.2
  • 11
    • 0014129195 scopus 로고
    • Hierarchical clustering schemes
    • S. C. Johnson. Hierarchical clustering schemes. Psychometrika, 32(3):241-254, 1967
    • (1967) Psychometrika , vol.32 , Issue.3 , pp. 241-254
    • Johnson, S.C.1
  • 14
    • 84939513214 scopus 로고    scopus 로고
    • Data analysis and decision support, studies in classification
    • Springer Berlin Heidelberg
    • S. Krolak-Schwerdt. Three-way multidimensional scaling: Formal properties and relationships between scaling methods. In D. Baier, R. Decker, and L. Schmidt-Thieme, editors, Data Analysis and Decision Support, Studies in Classification, Data Analysis, and Knowledge Organization, pages 82-90. Springer Berlin Heidelberg, 2005
    • (2005) Data Analysis, and Knowledge Organization , pp. 82-90
    • Krolak-Schwerdt, S.1    Decker, R.2    Schmidt-Thieme, L.3
  • 15
    • 40049099114 scopus 로고    scopus 로고
    • Defining clusters from a hierarchical cluster tree
    • Mar.
    • P. Langfelder, B. Zhang, and S. Horvath. Defining clusters from a hierarchical cluster tree. Bioinformatics, 24(5):719-720, Mar. 2008
    • (2008) Bioinformatics , vol.24 , Issue.5 , pp. 719-720
    • Langfelder, P.1    Zhang, B.2    Horvath, S.3
  • 16
    • 79952527132 scopus 로고    scopus 로고
    • Automatically determining phishing campaigns using the uscap methodology
    • Oct
    • R. Layton, P. Watters, and R. Dazeley. Automatically determining phishing campaigns using the uscap methodology. In eCrime Researchers Summit (eCrime), 2010, pages 1-8, Oct 2010
    • (2010) ECrime Researchers Summit (ECrime) , pp. 1-8
    • Layton, R.1    Watters, P.2    Dazeley, R.3
  • 19
    • 60349123688 scopus 로고    scopus 로고
    • Detection of cloaked web spam by using tag-based methods
    • May
    • J.-L. Lin. Detection of cloaked web spam by using tag-based methods. Expert Syst. Appl., 36(4):7493-7499, May 2009. Available at http://dx. doi. org/10. 1016/j. eswa. 2008. 09. 056
    • (2009) Expert Syst. Appl , vol.36 , Issue.4 , pp. 7493-7499
    • Lin, J.-L.1
  • 24
    • 84950632109 scopus 로고
    • Objective criteria for the evaluation of clustering methods
    • W. M. Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical Association, 66(336):846-850, 1971
    • (1971) Journal of the American Statistical Association , vol.66 , Issue.336 , pp. 846-850
    • Rand, W.M.1
  • 25
    • 40949104348 scopus 로고    scopus 로고
    • Tracking web spam with HTML style similarities
    • Mar.
    • T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking web spam with html style similarities. ACM Trans. Web, 2(1):3:1-3:28, Mar. 2008
    • (2008) ACM Trans. Web , vol.2 , Issue.1 , pp. 31-328
    • Urvoy, T.1    Chauveau, E.2    Filoche, P.3    Lavergne, T.4
  • 27
    • 67249152321 scopus 로고    scopus 로고
    • Automating phishing website identification through deep MD5 matching
    • IEEE
    • B. Wardman and G. Warner. Automating phishing website identification through deep MD5 matching. In eCrime Researchers Summit, 2008, pages 1-7. IEEE, 2008.
    • (2008) ECrime Researchers Summit , pp. 1-7
    • Wardman, B.1    Warner, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.