Phishing Attacks Modifications and Evolutions
暂无分享,去创建一个
[1] Xiaotie Deng,et al. Detection of phishing webpages based on visual similarity , 2005, WWW '05.
[2] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[3] Xiao Han,et al. PhishEye: Live Monitoring of Sandboxed Phishing Kits , 2016, CCS.
[4] Daisuke Miyamoto,et al. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.
[5] Naghmeh Moradpoor,et al. Employing machine learning techniques for detection and classification of phishing emails , 2017, 2017 Computing Conference.
[6] Aderemi Oluyinka Adewumi,et al. Classification of Phishing Email Using Random Forest Machine Learning Technique , 2014, J. Appl. Math..
[7] Norbert Fuhr,et al. XIRQL: a query language for information retrieval in XML documents , 2001, SIGIR '01.
[8] Gary Warner,et al. Analysis of Back-Doored Phishing Kits , 2011, IFIP Int. Conf. Digital Forensics.
[9] Nikolaus Augsten,et al. Tree edit distance: Robust and memory-efficient , 2016, Inf. Syst..
[10] Richard J. Enbody,et al. Crimeware-as-a-service - A survey of commoditized crimeware in the underground market , 2013, Int. J. Crit. Infrastructure Prot..
[11] Fabio Roli,et al. DeltaPhish: Detecting Phishing Webpages in Compromised Websites , 2017, ESORICS.
[12] Kang-Leng Chiew,et al. Phishing Detection via Identification of Website Identity , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[13] Scott Dick,et al. Detecting visually similar Web pages: Application to phishing detection , 2010, TOIT.
[14] Ankit Kumar Jain,et al. Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.
[15] Jun Ho Huh,et al. Phishing Detection with Popular Search Engines: Simple and Effective , 2011, FPS.
[16] Calton Pu,et al. Evolutionary study of phishing , 2008, 2008 eCrime Researchers Summit.
[17] Li Zhang,et al. Detection of phishing emails using data mining algorithms , 2015, 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).
[18] Gurmeet Singh Manku,et al. Detecting near-duplicates for web crawling , 2007, WWW '07.
[19] Richard Chbeir,et al. An overview on XML similarity: Background, current trends and future directions , 2009, Comput. Sci. Rev..
[20] Qian Cui,et al. Tracking Phishing Attacks Over Time , 2017, WWW.
[21] Christopher Krügel,et al. A layout-similarity-based approach for detecting phishing pages , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[22] Tyler Moore,et al. Concentrating Correctly on Cybercrime Concentration , 2015, WEIS.
[23] Hans-Jörg Schek,et al. Generating Vector Spaces On-the-fly for Flexible XML Retrieval , 2002 .
[24] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[25] Ilango Krishnamurthi,et al. A comprehensive and efficacious architecture for detecting phishing webpages , 2014, Comput. Secur..