Speeding up Anti-Phishing Tools Development using Self-Structuring Neural Network
暂无分享,去创建一个
[1] Mehmed Kantardzic,et al. Data-Mining Concepts , 2011 .
[2] R. G. Hutchins. Neural network topologies and training algorithms in nonlinear system identification , 1995, 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century.
[3] Fadi A. Thabtah,et al. Intelligent phishing detection system for e-banking using fuzzy data mining , 2010, Expert Syst. Appl..
[4] Alex Berson,et al. Building Data Mining Applications for CRM , 1999 .
[5] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[6] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[7] Arnon Rungsawang,et al. Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.
[8] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[9] Bernard Widrow,et al. 30 years of adaptive neural networks: perceptron, Madaline, and backpropagation , 1990, Proc. IEEE.
[10] Peter I. Cowling,et al. MCAR: multi-class classification based on association rule , 2005, The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005..
[11] Wynne Hsu,et al. Integrating Classification and Association Rule Mining , 1998, KDD.
[12] Xiaotie Deng,et al. An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.
[13] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[14] Daisuke Miyamoto,et al. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.
[15] J. Ross Quinlan,et al. Improved Use of Continuous Attributes in C4.5 , 1996, J. Artif. Intell. Res..
[16] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[17] Jadzia Cendrowska,et al. PRISM: An Algorithm for Inducing Modular Rules , 1987, Int. J. Man Mach. Stud..
[18] Ashok N. Srivastava,et al. Data Mining: Concepts, Models, Methods, and Algorithms , 2005, J. Comput. Inf. Sci. Eng..
[19] Mingxing He,et al. An efficient phishing webpage detector , 2011, Expert Syst. Appl..
[20] D. Edwards. Data Mining: Concepts, Models, Methods, and Algorithms , 2003 .
[21] Xuhua Ding,et al. Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[22] Jacek M. Zurada,et al. Introduction to artificial neural systems , 1992 .
[23] Albert Y. Zomaya,et al. Toward generating neural network structures for function approximation , 1994, Neural Networks.
[24] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[25] Rami Mohammad. Phishing Websites Datast , 2015 .
[26] I A Basheer,et al. Artificial neural networks: fundamentals, computing, design, and application. , 2000, Journal of microbiological methods.
[27] Yiming Ye,et al. Introduction to E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand , 2001, E-Commerce Agents.
[28] T. L. McCluskey,et al. An assessment of features related to phishing websites using an automated technique , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[29] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[30] Fadi A. Thabtah,et al. Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[31] A. S. Sodiya,et al. Threat Modeling Using Fuzzy Logic Paradigm , 2007 .
[32] Marcel Abendroth,et al. Data Mining Practical Machine Learning Tools And Techniques With Java Implementations , 2016 .