Desktop phishing attack detection and elimination using TSO program
暂无分享,去创建一个
M. K. Priyan | R. Jeyanthi | K. P. Rama Prabha | C. Gokul Nath | E. Vishnu Balan | R. Jeyanthi | C. Gokul Nath | E. Vishnu Balan
[1] Ronald L. Rivest,et al. Lightweight Encryption for Email , 2005, SRUTI.
[2] Jacinth Salome,et al. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .
[3] Xiaotie Deng,et al. Phishing Web page detection , 2005, Eighth International Conference on Document Analysis and Recognition (ICDAR'05).
[4] Xiaotie Deng,et al. An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.
[5] Amir Herzberg,et al. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks , 2004 .
[6] Lance James,et al. Phishing exposed , 2005 .
[7] Xiaotie Deng,et al. Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD) , 2006, IEEE Transactions on Dependable and Secure Computing.
[8] Joshua D. Reiss,et al. Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma–Delta Modulators , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[9] Cheng Wu,et al. The continuity of Mamdani method , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[10] Xuhua Ding,et al. Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[11] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.