|
Anti-Phishing Work Group, available online at www.antiphishing.org/ Autonomous System (AS), available online at http://en.wikipedia.org/wiki/Autonomous_system_(Internet) E. Baykan, M. Henzinger, L. Marian, I. Weber. (2009) “Purely URL-based topic classification”, WWW ''09 Proceedings of the 18th international conference on World wide web, pages 1109–1110. Fava, D.S., Byers, S.R., Yang, S.J. (2006). “Projecting Cyberattacks Through Variable-Length Markov Models”, The Journal of Machine Learning Research Volume 7, 12/1/2006, pages 359-369. F. Sebastiani. (2002). “Machine learning in automated text categorization”, Journal ACM Computing Surveys (CSUR) Volume 34 Issue 1, pages 1-47. H. Zuo, W. Hu, O. Wu. (2010). “Patch-based skin color detection and its application to pornography image filtering.” WWW ''10: Proceedings of the 19th international conference on World wide web, pages 1227–1228. Internet Assigned Numbers Authority (IANA) , available online at http://www.iana.org/ IP to Country mapping, available online at http://www.ip2nation.com/ J. Z. Kolter, M. A. Maloof. (2008). “Learning to Detect and Classify Malicious Executables in the Wild”, IEEE Transactions on Information Forensics and Security Volume 3 Issue 3, pages 2721-2744. Lee, P. Y., Hui, S. C., and Fong, A. C. M. (2002). “Neural Networks for Web Content Filtering,” IEEE Intelligent Systems Volume 17 Issue 5, pages 48-57. Lee, P. Y., Hui, S. C., and Fong, A. C. M. (2003). “A Structural and Content-Based Analysis for Web Filtering,” Internet Research: Electronic Networking Applications and Policy Volume 13 Issue 1, pages 27-37. L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, X. Deng. (2005). “Detection of phishing webpages based on visual similarity”, WWW ''05 Special interest tracks and posters of the 14th international conference on World Wide Web, pages 1060-1061. M. Deshpande, G. Karypis. (2004). “Selective Markov models for predicting Web page accesses”, ACM Transactions on Internet Technology (TOIT) Volume 4 Issue 2, pages 163–184. Natural Language Toolkit (NLTK) , available online at http://www.nltk.org/ Open Directory Project (ODP) , available online at http://www.dmoz.org/ Platform for Internet Content Selection (PICS) , available online at http://www.w3.org/PICS/ PhishTank, available online at www.phishtank.com/ R. Lempel, S. Moran. (2003). “Predictive caching and prefetching of query results in search engines.” WWW ''03: Proceedings of the 12th international conference on World Wide Web, pages 19–28. R. W. White, P. Bailey, and L. Chen. (2009). “Predicting user interests from contextual information.” SIGIR ''09: Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, pages 363–370. Root Zone Database, available online at http://www.iana.org/domains/root/db/ S. Gündüz, M. T. Özsu. (2003). “Recommendation models for user accesses to web pages” ICANN/ICONIP''03: Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing, pages 1003–1010. Trend Micro Inc., available online at http://tw.trendmicro.com/tw/about/ Trend MicroTM URL Filtering Module (Engine), available online at http://emea.trendmicro.com/imperia/md/content/uk/products/datasheets/ds02urlf070804gb.pdf Trend Micro Inc. WTP (Web Threat Protection), available online at http://www.trendmicro.com.tw/wtp/micro/index.asp X. Shen, S. Dumais, and E. Horvitz. (2005). “Analysis of topic dynamics in web search.” Proceedings of the International Conference on World Wide Web, pages 1102–1103. Yahoo Directory, available online at http://dir.yahoo.com/ Z. Cheng, B. Gao and T.Y. Liu. (2010). “Actively predicting diverse search intent from user browsing behaviors.” WWW ’10: Proceedings of the 19th international conference on World Wide Web, pages 221–230.
|