Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis
暂无分享,去创建一个
[1] S. Moonesamy. The "about" URI Scheme , 2012, RFC.
[2] Michalis Faloutsos,et al. PhishDef: URL names say it all , 2010, 2011 Proceedings IEEE INFOCOM.
[3] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[4] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.
[5] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[6] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[7] Gerhard Paass,et al. Improved Phishing Detection using Model-Based Features , 2008, CEAS.
[8] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[9] 痛并快乐着. McAfee SiteAdvisor,让我们的搜索更安全 , 2007 .
[10] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[11] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[12] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[13] S. Sathiya Keerthi,et al. A simple and efficient algorithm for gene selection using sparse logistic regression , 2003, Bioinform..
[14] Justin Tung Ma,et al. Learning to detect malicious URLs , 2011, TIST.
[15] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.
[16] Chih-Jen Lin,et al. Trust Region Newton Method for Logistic Regression , 2008, J. Mach. Learn. Res..
[17] Koby Crammer,et al. Confidence-weighted linear classification , 2008, ICML '08.
[18] Timothy W. Finin,et al. SVMs for the Blogosphere: Blog Identification and Splog Detection , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.
[19] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[20] Lawrence K. Saul,et al. Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.
[21] Brian Ryner,et al. Large-Scale Automatic Classification of Phishing Pages , 2010, NDSS.
[22] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.