共 11 条
[1]
Detecting Known and New Salting Tricks in Unwanted Emails. A. Bergholz,G. Paa(?),F. Reichartz,S. Strobel,M. F. Moens,B. Witten. Proceedings Conference on Email an AntiSpam CEAS . 2008
[2]
A comparison of machine learning techniques for phishing detection. Nimeh S A,Nappa D,Wang X L,et al. Proceedings of the Anti-Phishing Working Groups 2nd Annual Ecrime Researchers Summit . 2007
[3]
Phishing phish:An eval-uation of anti-phishing toolbars. CRANOR L,EGELMAN S,HONG J,et al. http:∥www.cylab.cmu.edu/research/techreports/2006/tr_cylab06018.html .
[4]
A proposalof the Ada Boost-based detection of phishing sites. MIYAMOTO D,HAZEYAMA H,KADOBAYASHI Y. Proceed-ings of the Joint Workshop on Information Security . 2007
[5]
To-wards phishing e-mail detection based on their structural properties. CHANDRASEKARAN M,KARAYANAN K,UPDAHYAYA S. http:∥www.albany.edu/iasymposium/proceedings/2006/chandrasekaran.pdf .
[6]
Improved PhishingDetection Using Model-based Features. BERGHOLZ A,CHANG J H,PAAβG,et al. Proceedings of theConference on Email and Anti-Spam (CEAS) . 2008
[7]
Learning to Detect PhishingEmails. FETTE I,SADEH N,TOMASIC A. http:∥reports-archive.adm.cs.cmu.edu/anon/isri2006/abstracts/06-112.html .
[8]
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Collin Jackson,Daniel R. Simon,Desney S. Tan,Adam Barth. Proceedings of Usable Security (USEC ’’07) . 2007
[9]
Spamato: An Extendable Spam FilterSystem. K Albrecht,N Burri,R Wattenhofer. 2nd Conference on Email and Anti-Spam . 2005
[10]
New filtering approaches for phishing email. A Bergholz,JD Beer,S Glahn,MF Moens,G Paa?,S Strobel. J Comput Secur . 2010