-
1
-
-
85180529397
-
-
Advanced Network Technology Center, University of Oregon. University of Oregon Route Views Project. Jan
-
Advanced Network Technology Center, University of Oregon. University of Oregon Route Views Project. http://www.routeviews.org/, Jan. 2005.
-
(2005)
-
-
-
3
-
-
34548344520
-
-
H2/2008. Mar
-
Anti-Phishing Working Group. Phishing Activity Trends Report, H2/2008. http://www.antiphishing.org/reports/apwg_report_H2_2008.pdf, Mar. 2009.
-
(2009)
Phishing Activity Trends Report
-
-
-
4
-
-
33845989821
-
Can machine learning be secure?
-
Mar
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In ASIACCS’06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 16–25, Mar. 2006.
-
(2006)
ASIACCS’06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A. D.4
Tygar, J. D.5
-
5
-
-
71549144859
-
-
US Patent 7222127
-
J. Bem, G. Harik, J. Levenberg, N. Shazeer, and S. Tong. Large scale machine learning and methods. US Patent 7222127, 2007.
-
(2007)
Large scale machine learning and methods
-
-
Bem, J.1
Harik, G.2
Levenberg, J.3
Shazeer, N.4
Tong, S.5
-
6
-
-
0035478854
-
Random Forests
-
L. Breiman. Random Forests. Machine Learning, 45(1):5–32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
7
-
-
85180541533
-
-
G. Casto, O. Fisher, R. Moll, M. Nazif, and D. Born. Client specification for the Google Safe Browsing v2.1 protocol. http://code.google.com/p/google-safe-browsing/wiki/ Protocolv2Spec, 2007.
-
(2007)
Client specification for the Google Safe Browsing v2.1 protocol
-
-
Casto, G.1
Fisher, O.2
Moll, R.3
Nazif, M.4
Born, D.5
-
8
-
-
85071319367
-
Bigtable: A Distributed Storage System for Structured Data
-
Nov
-
F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A Distributed Storage System for Structured Data. In OSDI’06: Proceedings of the 7th symposium on Operating systems design and implementation, pages 205–218, Nov. 2006.
-
(2006)
OSDI’06: Proceedings of the 7th symposium on Operating systems design and implementation
, pp. 205-218
-
-
Chang, F.1
Dean, J.2
Ghemawat, S.3
Hsieh, W. C.4
Wallach, D. A.5
Burrows, M.6
Chandra, T.7
Fikes, A.8
Gruber, R. E.9
-
9
-
-
85044841595
-
Client-side Defense against Web-Based Identity Theft
-
Feb
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell. Client-side Defense against Web-Based Identity Theft. In NDSS’04: Proceedings of the 11th Annual Network and Distributed System Security Symposium, Feb. 2004.
-
(2004)
NDSS’04: Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
14
-
-
0035034830
-
What Makes Web Sites Credible?: A Report on a Large Quantitative Study
-
March-April
-
B. J. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, J. Paul, A. Rangnekar, J. Shon, P. Swani, and M. Treinen. What Makes Web Sites Credible?: A Report on a Large Quantitative Study. In CHI’01: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 61–68, March-April 2001.
-
(2001)
CHI’01: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 61-68
-
-
Fogg, B. J.1
Marshall, J.2
Laraki, O.3
Osipovich, A.4
Varma, C.5
Fang, N.6
Paul, J.7
Rangnekar, A.8
Shon, J.9
Swani, P.10
Treinen, M.11
-
15
-
-
2942731012
-
An Extensive Empirical Study of Feature Selection Metrics for Text Classification
-
G. Forman. An Extensive Empirical Study of Feature Selection Metrics for Text Classification. Journal of Machine Learning Research, 3:1289–1305, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1289-1305
-
-
Forman, G.1
-
16
-
-
77952338717
-
A Framework for Detection and Measurement of Phishing Attacks
-
Nov
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A Framework for Detection and Measurement of Phishing Attacks. In WORM’07: Proceedings of the 2007 ACM workshop on Recurring malcode, pages 1–8, Nov. 2007.
-
(2007)
WORM’07: Proceedings of the 2007 ACM workshop on Recurring malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A. D.4
-
18
-
-
85180538795
-
-
Google
-
Google. Google Safe Browsing API. http://code.google.com/apis/safebrowsing/, 2009.
-
(2009)
Google Safe Browsing API
-
-
-
20
-
-
37849049401
-
On the Effectiveness of Techniques to Detect Phishing Sites
-
July
-
C. Ludl, S. McAllister, E. Kirda, and C. Kruegel. On the Effectiveness of Techniques to Detect Phishing Sites. In DIMVA’07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 20–39, July 2007.
-
(2007)
DIMVA’07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 20-39
-
-
Ludl, C.1
McAllister, S.2
Kirda, E.3
Kruegel, C.4
-
21
-
-
70350630557
-
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs
-
June–July
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. In KDD’09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1245–1254, June–July 2009.
-
(2009)
KDD’09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L. K.2
Savage, S.3
Voelker, G. M.4
-
22
-
-
70049102000
-
Identifying Suspicious URLs: An Application of Large-Scale Online Learning
-
June
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Identifying Suspicious URLs: An Application of Large-Scale Online Learning. In ICML’09: Proceedings of the 26th Annual International Conference on Machine Learning, pages 681–688, June 2009.
-
(2009)
ICML’09: Proceedings of the 26th Annual International Conference on Machine Learning
, pp. 681-688
-
-
Ma, J.1
Saul, L. K.2
Savage, S.3
Voelker, G. M.4
-
24
-
-
34547303529
-
-
Netcraft
-
Netcraft. Netcraft Toolbar. http://toolbar.netcraft.com/, 2004.
-
(2004)
Netcraft Toolbar
-
-
-
25
-
-
84900296248
-
-
OpenDNS
-
OpenDNS. Phishtank. http://www.phishtank.com/, 2009.
-
(2009)
Phishtank
-
-
-
26
-
-
0003780986
-
-
Technical report, Stanford Digital Library Technologies Project
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project, 1998.
-
(1998)
The PageRank Citation Ranking: Bringing Order to the Web
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
28
-
-
0003653039
-
-
McGraw-Hill, Inc., New York, NY, USA
-
G. Salton and M. J. McGill. Introduction to Modern Information Retrieval. McGraw-Hill, Inc., New York, NY, USA, 1983.
-
(1983)
Introduction to Modern Information Retrieval
-
-
Salton, G.1
McGill, M. J.2
-
29
-
-
51349093651
-
-
F. Schneider, N. Provos, R. Moll, M. Chew, and B. Rakowski. Phishing Protection Design Documentation. http://wiki.mozilla.org/Phishing_Protection:_Design_Documentation, 2006.
-
(2006)
Phishing Protection Design Documentation
-
-
Schneider, F.1
Provos, N.2
Moll, R.3
Chew, M.4
Rakowski, B.5
-
30
-
-
84904793179
-
An Empirical Analysis of Phishing Blacklists
-
July
-
S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang. An Empirical Analysis of Phishing Blacklists. In CEAS 2009: Sixth Conference on Email and Anti-Spam, July 2009.
-
(2009)
CEAS 2009: Sixth Conference on Email and Anti-Spam
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L. F.4
Hong, J.5
Zhang, C.6
-
31
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
Nov
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security, Nov. 2009.
-
(2009)
CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
|