|
Anti-Phishing Work Group, available online at www.antiphishing.org/ Saeed Abu-Nimeh 1, Dario Nappa, Xinlei Wang, and Suku Nair “A Comparison of Machine Learning Techniques for Phishing Detection” , eCrime ''07, pages 1-10. R. Dhamija, J. D. Tygar. and M. Hearst. (2005). “Why Phishing Works”, CHI Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590 R. E. Fan, K. W. Chang, C. J. Hsieh, X. R. Wang and C. J. Lin. LIBLINEAR: A Library for Large Linear Classi&;#64257;cation. http://www.csie.ntu.edu.tw/ cjlin/liblinear Mark Felegyhazi, Christian Kreibich,Vern Paxson “On the Potential of Proactive Domain Blacklisting” , LEET''10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats, pages 1-8. Lung-Hao Lee, Yen-Cheng Juan, Kuei-Ching Lee, Wei-Lin Tseng, Hsin-Hsi Chen and Yuen-Hsien Tseng “Context-Aware Web Security Threat Prevention” , CCS ''12, pages 1-3. Justin Ma, Lawrence K. Saul, Stefan Savage and Geoffrey M. Voelker “Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs” , KDD’09, pages 1-9. Pawan Prakash, Manish Kumar, Ramana Rao Kompella and Minaxi Gupta. “PhishNet: Predictive Blacklisting to Detect Phishing Attacks”, Mini-Conference at IEEE INFOCOM 2010 PhishTank, available online at http://www.phishtank.com/, pages 1-5. Fergus Toolan and Joe Carthy. “Feature Selection for Spam and Phishing Detection”, eCrime Researchers Summit (eCrime), 2010, pages 1-12.
|