Catching Classical and Hijack-Based Phishing Attacks
暂无分享,去创建一个
[1] Wilfried N. Gansterer,et al. E-Mail Classification for Phishing Defense , 2009, ECIR.
[2] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[3] Gerhard Paass,et al. Improved Phishing Detection using Model-Based Features , 2008, CEAS.
[4] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[5] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[6] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[7] Rakesh M. Verma,et al. Semantic Feature Selection for Text with Application to Phishing Email Detection , 2013, ICISC.
[8] Jason I. Hong,et al. A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.
[9] Justin Tung Ma,et al. Learning to detect malicious URLs , 2011, TIST.
[10] Marie-Francine Moens,et al. New filtering approaches for phishing email , 2010, J. Comput. Secur..
[11] Rakesh M. Verma,et al. Detecting Phishing Emails the Natural Language Way , 2012, ESORICS.
[12] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[13] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[14] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[15] Christopher Krügel,et al. On the Effectiveness of Techniques to Detect Phishing Sites , 2007, DIMVA.
[16] Brian Ryner,et al. Large-Scale Automatic Classification of Phishing Pages , 2010, NDSS.
[17] Weider D. Yu,et al. PhishCatch - A Phishing Detection Tool , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[18] Peter Ingwersen,et al. Developing a Test Collection for the Evaluation of Integrated Search , 2010, ECIR.
[19] Andrew H. Sung,et al. Detection of Phishing Attacks: A Machine Learning Approach , 2008, Soft Computing Applications in Industry.
[20] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[21] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[22] Dimitris Gritzalis,et al. Computer Security - Esorics 2010 , 2011 .
[23] Lance James,et al. Phishing exposed , 2005 .
[24] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[25] Moti Yung,et al. Computer Security – ESORICS 2012 , 2012, Lecture Notes in Computer Science.
[26] Carolyn Penstein Rosé,et al. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection , 2010, ESORICS.
[27] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.