A survey of Learning Based Techniques of Phishing Email Filtering
暂无分享,去创建一个
Tat-Chee Wan | Altyeb Altaher | Karim Hashim Al-saedi | Ammar Almomani | Sureswaran Ramadass | Ahmad M. Manasrah | Ahmad M. Manasrah | Eman Almomani | Ahmad ALnajjar | Ammar Almomani | Altyeb Altaher | S. Ramadass | Ahmad Alnajjar | Karim Al-Saedi | T. Wan | E. Almomani | K. Al-saedi
[1] John Yearwood,et al. Establishing phishing provenance using orthographic features , 2009, 2009 eCrime Researchers Summit.
[2] Adil M. Bagirov,et al. Modified global k-means algorithm for minimum sum-of-squares clustering problems , 2008, Pattern Recognit..
[3] J. Akilandeswari,et al. A SURVEY ON PARTITION CLUSTERING ALGORITHMS , 2011 .
[4] Luiz Eduardo Soares de Oliveira,et al. Obtaining the threat model for e-mail phishing , 2013, Appl. Soft Comput..
[5] Justin Zhijun Zhan,et al. Phishing detection using stochastic learning-based weak estimators , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[6] Fraunhofer Iais,et al. A Real-Life Study in Phishing Detection , 2010 .
[7] Simon Brown,et al. Detecting Phishing Emails Using Hybrid Features , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[8] Andrew H. Sung,et al. Detection of Phishing Attacks: A Machine Learning Approach , 2008, Soft Computing Applications in Industry.
[9] Jemal H. Abawajy,et al. Hybrid Feature Selection for Phishing Email Detection , 2011, ICA3PP.
[10] Yang Xin,et al. Protection Against Phishing Attacks: A Survey , 2011 .
[11] Plamen Angelov,et al. Evolving Intelligent Systems: Methodology and Applications , 2010 .
[12] Nikola Kasabov,et al. Evolving Connectionist Systems (ECOS) , 2007 .
[13] Sureswaran Ramadass,et al. Evolving Fuzzy Neural Network for Phishing Emails Detection , 2012 .
[14] M. Dolores del Castillo,et al. An Integrated Approach to Filtering Phishing E-mails , 2007, EUROCAST.
[15] Sureswaran Ramadass,et al. An Online Model on Evolving Phishing E-mail Detection and Classification Method , 2011 .
[16] Olivier Chapelle,et al. Training a Support Vector Machine in the Primal , 2007, Neural Computation.
[17] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[18] Musa A. Mammadov,et al. Profiling Phishing Emails Based on Hyperlink Information , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[19] Youssef Iraqi,et al. Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach , 2013 .
[20] Yi Hsien Wang,et al. Financial Information Fraud Risk Warning for Manufacturing Industry - Using Logistic Regression and Neural Network , 2011 .
[21] N. Kasabov,et al. Evolving Connectionist Systems with Evolutionary Self-Optimisatio , 2005 .
[22] Enrico Blanzieri,et al. A survey of learning-based techniques of email spam filtering , 2008, Artificial Intelligence Review.
[23] Shambhu J. Upadhyaya,et al. PHONEY: mimicking user response to detect phishing attacks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[24] Zhang Weifeng,et al. Detecting Phishing Web Pages Based on Image Perceptual Hashing Technology , 2012 .
[25] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[26] Matthew Warren,et al. Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[27] Wilfried N. Gansterer,et al. E-Mail Classification for Phishing Defense , 2009, ECIR.
[28] Gerhard Paass,et al. Improved Phishing Detection using Model-Based Features , 2008, CEAS.
[29] John Yearwood,et al. Consensus Clustering and Supervised Classification for Profiling Phishing Emails in Internet Commerce Security , 2010, PKAW.