Data Cooperatives for Neighborhood Watch
暂无分享,去创建一个
[1] Jeremy Mennis,et al. Incorporating Geographic Information Science and Technology in Response to the COVID-19 Pandemic , 2020, Preventing chronic disease.
[2] T. Chithralekha,et al. Classification of Anti-phishing Solutions , 2019, SN Computer Science.
[3] Yang Wang,et al. PhishLedger: A Decentralized Phishing Data Sharing Mechanism , 2019 .
[4] Ram Dantu,et al. Distributed Ledger for Spammers' Resume , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[5] Arun Vishwanath,et al. Getting phished on social media , 2017, Decis. Support Syst..
[6] Ed de Quincey,et al. Using supervised machine learning algorithms to detect suspicious URLs in online social networks , 2017, ASONAM.
[7] Elijah Blessing Rajsingh,et al. Intelligent phishing url detection using association rule mining , 2016, Human-centric Computing and Information Sciences.
[8] Li Zhang,et al. Detection of phishing emails using data mining algorithms , 2015, 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).
[9] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[10] J. Hajgude,et al. “Phish mail guard: Phishing mail detection technique by using textual and URL analysis” , 2012, 2012 World Congress on Information and Communication Technologies.
[11] Tommy W. S. Chow,et al. Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach , 2011, IEEE Transactions on Neural Networks.
[12] Stephen Groat,et al. GoldPhish: Using Images for Content-Based Phishing Analysis , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[13] Paul Sroufe,et al. E‐Shape Analysis , 2009 .
[14] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[15] S. Resnick,et al. QQ Plots, Random Sets and Data from a Heavy Tailed Distribution , 2007, math/0702551.
[16] Srikanth Palla,et al. A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails , 2006 .
[17] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[18] A. Wechsler. Statistics for the rest of us. , 2001, The Journal of thoracic and cardiovascular surgery.
[19] Empowering Innovation through Data Cooperatives , 2021, Building the New Economy.
[20] Ram Dantu,et al. Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews , 2020, IACR Cryptol. ePrint Arch..
[21] Towards an Internet of Trusted Data , 2019, Trusted Data.
[22] Koichi Nakayama,et al. An Algorithm that Prevents SPAM Attacks using Blockchain , 2018 .
[23] Abdelfettah Belghith,et al. Using Case-Based Reasoning for Phishing Detection , 2017, ANT/SEIT.
[24] Daniel Davis Wood. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[25] U. Vidya Sagar,et al. Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm , 2013 .
[26] L. Shenton,et al. Gamma Distribution , 2011, International Encyclopedia of Statistical Science.
[27] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .