暂无分享,去创建一个
[1] Indranil Bose,et al. Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities , 2007, Commun. Assoc. Inf. Syst..
[2] J. Ross Quinlan,et al. Improved Use of Continuous Attributes in C4.5 , 1996, J. Artif. Intell. Res..
[3] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[4] Huan Liu,et al. Feature Selection for Classification , 1997, Intell. Data Anal..
[5] Xiaotie Deng,et al. Detection of phishing webpages based on visual similarity , 2005, WWW '05.
[6] Dan Boneh,et al. A browser plug-in solution to the unique password problem , 2005 .
[7] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[8] Christopher Krügel,et al. Protecting Users against Phishing Attacks , 2006, Comput. J..
[9] Yiming Yang,et al. Modified Logistic Regression: An Approximation to SVM and Its Applications in Large-Scale Text Categorization , 2003, ICML.