Domain Classifier: Compromised Machines Versus Malicious Registrations
暂无分享,去创建一个
[1] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[2] Marco Balduzzi,et al. Automatic Extraction of Indicators of Compromise for Web Applications , 2016, WWW.
[3] Ilango Krishnamurthi,et al. A comprehensive and efficacious architecture for detecting phishing webpages , 2014, Comput. Secur..
[4] Mehryar Mohri,et al. AUC Optimization vs. Error Rate Minimization , 2003, NIPS.
[5] J. Hertz,et al. Generalization in a linear perceptron in the presence of noise , 1992 .
[6] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[7] Fabio Roli,et al. DeltaPhish: Detecting Phishing Webpages in Compromised Websites , 2017, ESORICS.
[8] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[9] Zhou Li,et al. Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains , 2017, CCS.
[10] Nick Feamster,et al. PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration , 2016, CCS.
[11] Mike Thelwall,et al. A fair history of the Web? Examining country balance in the Internet Archive , 2004 .
[12] Qian Cui,et al. Tracking Phishing Attacks Over Time , 2017, WWW.
[13] Tyler Moore,et al. The Impact of Incentives on Notice and Take-down , 2008, WEIS.
[14] Ankit Kumar Jain,et al. Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.