Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
暂无分享,去创建一个
[1] Yevgeniy Vorobeychik,et al. Optimal Personalized Filtering Against Spear-Phishing Attacks , 2015, AAAI.
[2] John Musacchio,et al. Computing the Nash Equilibria of Intruder Classification Games , 2012, GameSec.
[3] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[4] Yevgeniy Vorobeychik,et al. Equilibrium Analysis of Multi-Defender Security Games , 2015, IJCAI.
[5] Bo An,et al. An Initial Study on Personalized Filtering Thresholds in Defending Sequential Spear Phishing Attacks , 2015 .
[6] Enrico Blanzieri,et al. A survey of learning-based techniques of email spam filtering , 2008, Artificial Intelligence Review.
[7] Luis E. Ortiz,et al. Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks , 2012, UAI.
[8] Moez Draief,et al. Contagion and observability in security domains , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] H. Kunreuther,et al. Interdependent Security , 2003 .
[10] Tomás Pevný,et al. Randomized Operating Point Selection in Adversarial Classification , 2014, ECML/PKDD.
[11] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[12] Cormac Herley,et al. A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.
[13] P. Lalitha,et al. New Filtering Approaches for Phishing Email , 2013 .
[14] Levente Buttyán,et al. A Survey of Interdependent Information Security Games , 2014, ACM Comput. Surv..