|
[1] H. Shirazi, K. Haefner and I. Ray, "Fresh-Phish: A Framework for Auto-Detection of Phishing Websites," Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), pp. 137-143, 2017. [2] A. J. Park, R. N. Quadari and H. H. Tsang, "Phishing Website Detection Framework through Web Scraping and Data Mining," Proceedings of the IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 680-684, 2017. [3] APWG, Unifying the Global Response to Cybercrime(https://www.antiphishing.org/) [4] Z. A. Wen, Y. Li, R. Wade, J. Huang and A. Wang, "What.Hack: Learn Phishing Email Defence the Fun Way," Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17), pp. 234-237, 2017. [5] J. Mao, W. Tian, P. Li, T. Wei and Z. Liang, "Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity," Journal of the IEEE Access, Vol. 5, pp. 17020-17030, 2017. [6] S. Afroz and R. Greenstadt, "PhishZoo: Detecting Phishing Websites by Looking at Them," Proceedings of the IEEE Fifth International Conference on Semantic Computing, pp. 368-375, 2011. [7] Q. Cui, G. V. Jourdan, G. V. Bochmann, R. Couturier and I. V. Onut, "Tracking Phishing Attacks Over Time," Proceedings of the 26th International Conference on World Wide Web (WWW '17), pp. 667-676, 2017. [8] J. Saxe and K. Berlin, "eXpose: A Character-Level Convolutional Neural Network with Embeddings for Detecting Malicious URLs, File Paths and Registry Keys,” Journal of CoRR, Vol.abs/1702.08568, 2017. [9] A. Subasi, E. Molah, F. Almkallawi and T. J. Chaudhery, "Intelligent Phishing Website Detection Using Random Forest Classifier," Proceedings of the International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1-5, 2017. [10] J. Zhang and Y. Wang, "A Real-Time Automatic Detection of Phishing URLs," Proceedings of Computer Science and Network Technology (ICCSNT), pp. 1212-1216, 2012. [11] A.K. Jain and B.B. Gupta, "Comparative Analysis of Features Based Machine Learning Approaches for Phishing Detection," Proceedings of the International Conference on Computing for Sustainable Global Development, pp.2125-2130, 2016. [12] D. Miyamoto, H. Hazeyama and Y. Kadobayashi, "An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites," Proceedings of the 15th international conference on Advances in neuro-information processing, pp. 539-546, 2008. [13] R. S. Rao and A. R. Pais, "Detecting Phishing Websites Using Automation of Human Behavior," Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security (CPSS '17), pp. 33-42, 2017. [14] Anandita, D. P. Yadav, P. Paliwal, D. Kumar and R. Tripathi, "A Novel Ensemble Based Identification of Phishing E-Mails," Proceedings of the 9th International Conference on Machine Learning and Computing (ICMLC 2017), pp. 447-451, 2017. [15] N. O. F. Elssied, O. Ibrahim and A. H. Osman, "A Novel Feature Selection Based on One-Way ANOVA F-Test for E-Mail Spam Classification," Journal of Applied Sciences, Engineering and Technology, Vol. 7, No. 3, pp. 625-638, 2013. [16] K. L. Chiew, E. H. Chang, S. N. Sze and W. K. Tiong, "Utilisation of Website Logo for Phishing Detection," Journal of the Computers and Security, Vol. 54, pp.16-26, 2015. [17] J. Jung and E. Sit, "An Empirical Study of Spam Traffic and the Use of Dns Black Lists," Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 370-375, 2004. [18] L. Wenyin, N. Fang, X. Quan, B. Qiu and Gang Liu, "Discovering Phishing Target Based on Semantic Link Network," Journal of Future Generation Computer Systems, Vol. 26, No. 3, pp. 381-388, 2010. [19] How Quad9 works, Internet Security & Privacy In a Few Easy Steps(https://www.quad9.net/) [20] S. Haruta, H. Asahina and I. Sasase, "Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder," Proceedings of the IEEE Global Communications Conference, pp. 1-6, 2017. [21] G. Wang, H. Liu, S. Becerra, K. Wang, S. Belongie, H. Shacham and Stefan Savage, "Verilogo: Proactive Phishing Detection via Logo Recognition," Technical Report CS2011-0669, pp. 1-20 2011. [22] J.S. White, J.N. Matthews and J.L. Stacy, "A Method for the Automated Detection of Phishing Websites through Both Site Characteristics and Image Analysis," Proceedings of the Society of Photo-Optical Instrumentation Engineers(SPIE), Vol. 8408, pp. 84080B, 2012. [23] Z. Zhang, Q. He and B. Wang, "A Novel Multi-Layer Heuristic Model for Anti-Phishing," Proceedings of the 6th International Conference on Information Engineering (ICIE '17), pp.21:1-21:6, 2017. [24] R. Porkodi, "Comparison of Filter Based Feature Selection Algorithms: An Overview," International Journal of the Innovative Research in Technology & Science(IJIRTS), Vol. 2, No.2, pp.108-113, 2014. [25] A. Abunadi, O. Akanbi and A. Zainal, "Feature Extraction Process: A Phishing Detection Approach," Proceedings of the 13th International Conference on Intellient Systems Design and Applications, pp. 331-335, 2013. [26] E. H. Chang, K. L. Chiew, S. N. Sze and W. K. Tiong, "Phishing Detection via Identification of Website Identity," Proceedings of the International Conference on IT Convergence and Security (ICITCS), pp. 1-4, 2013. [27] M. Dash, H. Liu and H. Matthews, "Consistency Based Feature Selection," Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 98-109, 2000. [28] A. C. Bahnsen, E. C. Bohorquez, S. Villegas, J. Vargas and F. A. González, "Classifying Phishing URLs Using Recurrent Neural Networks," Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), pp. 1-8, 2017. [29] D. R. Ibrahim and A. H. Hadi, "Phishing Websites Prediction Using Classification Techniques," Proceedings of the International Conference on New Trends in Computing Sciences (ICTCS), pp. 133-137, 2017. [30] M. A. Janabi, E. D. Quincey and P. Andras, "Using Supervised Machine Learning Algorithms to Detect Suspicious URLs in Online Social Networks," Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (ASONAM '17), pp. 1104-1111, 2017. [31] R.L. Plackett, "Karl Pearson and the Chi-Squared Test," Proceedings of the International Statistical Review, pp. 59-72, 1983. [32] R. Verma and A. Das, "What's in a URL: Fast Feature Extraction and Malicious URL Detection," Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics (IWSPA '17), pp. 55-63, 2017. [33] L. Rokach and O. Maimon, "Top-Down Induction of Decision Trees Classifiers - a Survey," Journal of the IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), Vol. 35, No. 4, pp. 476-487, 2005. [34] A. S. More and D. P. Rana, "Review of Random Forest Classification Techniques to Resolve Data Imbalance," Proceedings of the 1st International Conference on Intelligent Systems and Information Management (ICISIM), Aurangabad, pp. 72-78, 2017. [35] Misha Denil, David Matheson and Nando de Freitas, "Narrowing the Gap: Random Forests In Theory and In Practice," Proceedings of the International Conference on Machine Learning, Beijing, pp. 1-9, 2014. [36] "UCI Machine Learning Repository: Phishing Websites Data Set." [Online]. Available: https://archive.ics.uci.edu/ml/datasets/Phishing+Websites [37] Z. Hu, R. Chiong, I. Pranata, W. Susilo and Y. Bao, "Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data," Proceedings of the IEEE Congress on Evolutionary Computation (CEC), pp. 5186-5194, 2016. [38] S. Tayeb, M. Pirouz, J. Sun, K. Hall, A. Chang, J. Li, C. Song, A. Chauhan, M. Ferra, T. Sager, J. Zhan and S. Latifi, "Toward Predicting Medical Conditions Using K-Nearest Neighbors," Proceedings of the IEEE International Conference on Big Data (Big Data), pp. 3897-3903, 2017. [39] K. Huang, H. Jiang and X. Y. Zhang, "Field Support Vector Machines," Journal of the IEEE Transactions on Emerging Topics in Computational Intelligence, Vol. 1, No. 6, pp. 454-463, 2017. [40] C. Chang and C. Lin, "LIBSVM: A Library for Support Vector Machines," Journal of ACM transactions on intelligent systems and technology (TIST), Vol. 2, No. 3, pp. 27:1-27:27, 2011. [41] M. A. U. H. Tahir, S. Asghar, A. Zafar and S. Gillani, "A Hybrid Model to Detect Phishing-Sites Using Supervised Learning Algorithms," Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI), pp. 1126-1133, 2016. [42] Z. H. Zhou, "Ensemble Methods: Foundations and Algorithms," Chapman & Hall/CRC, pp. 1-234, 2012. [43] V. Ramanathan and H. Wechsler, "Phishing Website Detection Using Latent Dirichlet Allocation and AdaBoost," Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 102-107, 2012. [44] A.Y. Daeef, R.B. Ahmad, Y. Yacob and N.Y. Phing, "Wide Scope and Fast Websites Phishing Detection Using URLs Lexical Features," Proceedings of the International Conference on Electronic Design, pp.410-415, 2016. [45] Netscape Communications Corporation. Open directory rdf dump. (http://rdf.dmoz.org/) [46] H. Sutrisno and S. Halim, "Credit Scoring Refinement Using Optimized Logistic Regression," Proceedings of the International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT), pp. 26-31, 2017. [47] R. Verma and K. Dyer, "On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers," Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 111-122, 2015. [48] D.P. Kingma and J. Ba, "Adam: A Method for Stochastic Optimization," Journal of CoRR, Vol. abs/1412.6980, pp. 1-15, 2015. [49] H. Sak, A. Senior and F. Beaufays, "Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling," Proceedings of the Fifteenth Annual Conference of the International Speech Communication Association, pp.1-5, 2014. [50] H. Kim, H. Nam, W. Jung and J. Lee, "Performance Analysis of CNN Frameworks for GPUs," Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 55-64, 2017. [51] A. Radford, L. Metz and S. Chintala, "Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks," Journal of CoRR, Vol. abs/1511.06434, pp. 1-16, 2016. [52] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke and A. Rabinovich, "Going Deeper with Convolutions," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1-9, 2015. [53] W. Zhang, Q. Jiang, L. Chen and C. Li, "Two-Stage ELM for Phishing Web Pages Detection Using Hybrid Features," Journal of World Wide Web Journal, Vol. 20, No. 4, pp.797-813, 2016. [54] P.J.G Laencina, "Improving Predictions Using Linear Combination of Multiple Extreme Learning Machines," Journal of Information Technology and Control, Vol. 42, No. 1, pp. 86-93, 2013. [55] J.J. Cao, S. Kwong, R. Wang and K. Li, "A Weighted Voting Method Using Minimum Square Error Based on Extreme Learning Machine," Proceedings of International Conference on Machine Learning and Cybernetics, pp. 411-414, 2012. [56] 壹讀, 選擇支持向量機(SVM)核函數(https://read01.com/Qan5g7.html#.WtWxuy65thE) [57] T. Chen and C. Guestrin, "XGBoost: A Scalable Tree Boosting System," Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785-794, 2016. [58] D. E. Rumelhart, G. E. Hinton and R. J. Williams, "Learning Representations by Back-Propagating Errors," Journal of Nature, Vol. 323, No. 6088, pp. 533-536, 1986. [59] S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Journal of Neural Computation, Vol. 9, No. 8, pp. 1735-1780, 1997. [60] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, "Generative Adversarial Nets," Proceedings of the NIPS, pp. 2672-2680, 2014. [61] P. Baldi, "Autoencoders, Unsupervised Learning, and Deep Architectures," Proceedings of ICML Workshop on Unsupervised and Transfer Learning, pp. 37-49, 2012. [62] Oversampling and undersampling in data analysis. (https://en.wikipedia.org/wiki/Oversampling_and_undersampling_in_data_analysis) [63] Z. Zheng, Y. Cai and Y. Li, "Oversampling Method for Imbalanced Classification," Journal of the Computing and informatics, Vol. 34, No. 5, pp. 1017-1037, 2016. [64] H. Han, W. Y. Wang and B. H. Mao, "Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning," Proceedings of the international conference on Advances in Intelligent Computing, pp. 878-887, 2005. [65] H. He, Y. Bai, E. A. Garcia and S. Li, "ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning," Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 1322-1328, 2008. [66] L. Bottou, "Large-Scale Machine Learning with Stochastic Gradient Descent," Proceedings of COMPSTAT'2010, pp.177-186, 2010. [67] I. Sutskever, J. Martens, G. Dahl and Geoffrey Hinton, "On the Importance of Initialization and Momentum in Deep Learning," Proceedings of the 30th International Conference on International Conference on Machine Learning, Vol. 28, pp. 1139-1147, 2013. [68] W. Su, L. Chen, M. Wu, M. Zhou, Z. Liu and W. Cao, "Nesterov Accelerated Gradient Descent-Based Convolution Neural Network with Dropout for Facial Expression Recognition," Proceedings of Asian Control Conference (ASCC), pp. 1063-1068, 2017. [69] E. YAZAN and M. F. Talu, "Comparison of the Stochastic Gradient Descent Based Optimization Techniques," Proceedings of International Artificial Intelligence and Data Processing Symposium (IDAP), pp. 1-5, 2017. [70] M. D. Zeiler, "Adadelta: An Adaptive Learning Rate Method," Journal of CoRR, Vol. abs/1212.5701, pp. 1-6, 2012. [71] Y. N. Dauphin, H. D. Vries, J. Chung and Y. Bengio, "RMSProp and Equilibrated Adaptive Learning Rates for Non-Convex Optimization," Journal of CoRR, Vol. abs/1502.04390, pp. 1-10, 2015. [72] B. Anderson and D. McGrew, "Identifying Encrypted Malware Traffic with Contextual Flow Data," Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 35-46, 2016. [73] B. Anderson and D. McGrew, " Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity," Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1723-1732, 2017.
|