Assessing the severity of phishing attacks: A hybrid data mining approach
暂无分享,去创建一个
Xi Chen | Indranil Bose | Chenhui Guo | Alvin Chung Man Leung | X. Chen | I. Bose | A. Leung | Chenhui Guo
[1] Xin Luo,et al. The Phishing Hook: Issues and Reality , 2004 .
[2] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[3] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[4] Kweku-Muata Osei-Bryson,et al. Exploring the characteristics of Internet security breaches that impact the market value of breached firms , 2007, Expert Syst. Appl..
[5] Indranil Bose,et al. Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities , 2007, Commun. Assoc. Inf. Syst..
[6] Christopher Krügel,et al. On the Effectiveness of Techniques to Detect Phishing Sites , 2007, DIMVA.
[7] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] Frederick Kaefer,et al. Determining the appropriate amount of data for classifying consumers for direct marketing purposes , 2003 .
[9] RadhaKanta Mahapatra,et al. Business data mining - a machine learning perspective , 2001, Inf. Manag..
[10] E. Airoldi,et al. Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails , 2004 .
[11] Jackie Rees Ulmer,et al. Market Reactions to Information Security Breach Announcements: An Empirical Analysis , 2007, Int. J. Electron. Commer..
[12] N. P. Singh. Online Frauds in Banks with Phishing , 2007 .
[13] Jan Guynes Clark,et al. Why there aren't more information security research studies , 2004, Inf. Manag..
[14] Jackie Rees Ulmer,et al. Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents , 2008, WEIS.
[15] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[16] Hal Berghel. Phishing mongers and posers , 2006, CACM.
[17] M. Workman. Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security , 2008 .
[18] Sungzoon Cho,et al. Response models based on bagging neural networks , 2005 .
[19] Hou-Kuan Huang,et al. An intrusion detection system based on data mining and immune principles , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[20] Carolyn F. Holton,et al. Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem , 2009, Decis. Support Syst..
[21] Greg Goth. Phishing attacks rising, but dollar losses down , 2005, IEEE Security & Privacy.
[22] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[23] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[24] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[25] Wei Liu,et al. A Behavior-Based Detection Approach to Mass-Mailing Host , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[26] A. Molla,et al. Adoption and Use of Internet Banking in the Sultanate of Oman: An Exploratory Study , 2004 .
[27] N. Crockford. An introduction to risk management , 1980 .
[28] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[29] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[30] Christiane Fellbaum,et al. Book Reviews: WordNet: An Electronic Lexical Database , 1999, CL.
[31] Ronen Feldman,et al. Book Reviews: The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data by Ronen Feldman and James Sanger , 2008, CL.
[32] Lorrie Faith Cranor,et al. Lessons from a real world evaluation of anti-phishing training , 2008, 2008 eCrime Researchers Summit.
[33] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[34] Chih-Ping Wei,et al. Accommodating Individual Preferences in the Categorization of Documents: A Personalized Clustering Approach , 2006, J. Manag. Inf. Syst..
[35] Indranil Bose,et al. Indirect Financial Loss of Phishing to Global Market , 2008, ICIS.
[36] John Blackley,et al. Threats to Information Security , 2004 .
[37] Elias Levy. Criminals Become Tech Savvy , 2004, IEEE Secur. Priv..
[38] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[39] Mojtaba Vahidi-Asl,et al. Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods , 2007, 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops.
[40] Frederick Kaefer,et al. A neural network application to consumer classification to improve the timing of direct marketing activities , 2005, Comput. Oper. Res..
[41] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[42] Abagail McWilliams,et al. Event Studies In Management Research: Theoretical And Empirical Issues , 1997 .
[43] Abdul Quaiyum Ansari,et al. Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).
[44] J. Doug Tygar,et al. Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks , 2005, HIP.
[45] Wilfried N. Gansterer,et al. E-Mail Classification for Phishing Defense , 2009, ECIR.
[46] Olivia R. Liu Sheng,et al. Discovering company revenue relations from news: A network approach , 2009, Decis. Support Syst..
[47] Seven Hinde. ID theft: the US legal fight back , 2004 .
[48] Xiaoning Zhang,et al. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..
[49] Bart Baesens,et al. Bayesian neural network learning for repeat purchase modelling in direct marketing , 2002, Eur. J. Oper. Res..