Do Word Clues Suffice in Detecting Spai and Phishing?
暂无分享,去创建一个
N.C. Rowe | R. Toledo | D.S. Barnes | C.H. Martell | D.P. Horner | M. Egan | M. McVicker | R. Betancourt | D.T. Davis | L. Guiterrez
[1] Gordon V. Cormack,et al. On-line spam filter fusion , 2006, SIGIR.
[2] Gordon V. Cormack,et al. Spam and the ongoing battle for the inbox , 2007, CACM.
[3] David S. Barnes,et al. A Defense-in-Depth Approach to Phishing , 2006 .
[4] Gongzhu Hu,et al. Identification of deliberately doctored text documents using frequent keyword chain (FKC) model , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[5] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[6] Chih-Chin Lai,et al. An empirical performance comparison of machine learning methods for spam e-mail categorization , 2004, Fourth International Conference on Hybrid Intelligent Systems (HIS'04).
[7] Katsuyuki Yamazaki,et al. Density-based spam detector , 2004, IEICE Trans. Inf. Syst..
[8] Neil C. Rowe. Marie-4: A High-Recall, Self-Improving Web Crawler That Finds Images Using Captions , 2002, IEEE Intell. Syst..
[9] Minoru Sasaki,et al. Spam detection using text clustering , 2005, 2005 International Conference on Cyberworlds (CW'05).
[10] N.C. Rowe,et al. Fake Honeypots: A Defensive Tactic for Cyberspace , 2006, 2006 IEEE Information Assurance Workshop.
[11] Du Zhang,et al. Some empirical results on two spam detection methods , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[12] José María Gómez Hidalgo,et al. Content based SMS spam filtering , 2006, DocEng '06.
[13] Hal Berghel. Phishing mongers and posers , 2006, CACM.