Phishing Using a Modified Bayesian Technique
暂无分享,去创建一个
[1] Valtteri Niemi,et al. Man-in-the-Middle in Tunnelled Authentication Protocols , 2003, Security Protocols Workshop.
[2] Kathleen M. Carley,et al. Exploration of communication networks from the Enron email corpus , 2005 .
[3] Emil Sit,et al. An empirical study of spam traffic and the use of DNS black lists , 2004, IMC '04.
[4] Alessandro Acquisti,et al. School of Phish: A Real-Word Evaluation of Anti-Phishing Training (CMU-CyLab-09-002) , 2009 .
[5] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[6] Min Wu,et al. Web wallet: preventing phishing attacks by revealing user intentions , 2006, SOUPS '06.
[7] N. Asokan. Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion) , 2003, Security Protocols Workshop.
[8] Gregg Tally. Phisherman: A Phishing Data Repository , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[9] Balachander Krishnamurthy,et al. Fishing for Phishing from the Network Stream , 2008 .
[10] M. Jakobsson,et al. Designing and Conducting Phishing Experiments , 2006 .
[11] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[12] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[13] M. Stepp. PhishHook : A tool to detect and prevent phishing attacks , 2005 .
[14] A. J. Ferguson. Fostering E-Mail Security Awareness: The West Point Carronade , 2005 .
[15] Jonathan A. Zdziarski,et al. Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification , 2005 .
[16] Markus Jakobsson,et al. Designing ethical phishing experiments , 2007, IEEE Technology and Society Magazine.
[17] Tyler Moore,et al. Cooperative attack and defense in distributed networks , 2008 .