Optimal Personalized Filtering Against Spear-Phishing Attacks
暂无分享,去创建一个
Yevgeniy Vorobeychik | Aron Laszka | Xenofon D. Koutsoukos | Aron Laszka | X. Koutsoukos | Yevgeniy Vorobeychik
[1] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[2] Richard Weber,et al. Online phishing classification using adversarial data mining and signaling games , 2010, SKDD.
[3] A. Asuncion,et al. UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences , 2007 .
[4] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[5] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[6] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[7] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[8] Heejo Lee,et al. Detecting Malicious Web Links and Identifying Their Attack Types , 2011, WebApps.
[9] Lorrie Faith Cranor,et al. Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.
[10] Yiming Yang,et al. The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .
[11] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[12] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[13] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..