لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
علیرضا صابری، جواد عظیمی، منیره عبدوس، بهروز میناییبیدگلی، بکارگیری روشهای ...
Dhamija, R., Tygar, J. D., Hearst, M.: Why Phishing Works. ...
Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks with ...
Anti-Phishing Working Group, Phishing Activity Trends Report May 2006, http ...
Anti-Phishing Working Group, Phishing Activity Trends Report May 2007, http ...
Wu, M., Miller, R.C. , Little, G.: Web Wallet: Preventing ...
Ross, B., Jackson, C., Miyake, N., Boneh, D. , Mitchell, ...
Yee, K., Sitaker, K.: Passpet: Convenient Password Management And Phishing ...
Gouda, M.G., et al.: SPP: An Anti-Phishing Single Password Protocol. ...
RSA Security, Protecting Against Phishing by Implementing Strong Two-Factor Authentication. ...
https : //www .rsasecurity .cO m/p roduc t _ / ...
Cook, D., Hartnett, J., Manderson, K., Scanlan, J.: Catching Spam ...
Pfleeger, P., Bloom, S.: Canning Spam: Proposed Solutions to Unwanted ...
Damiani, E., et al: An Open Digest-based Technique for Spam ...
Adida, B., Hohenberger, S., Rivest, R.: Fighting Phishing Attacks: A ...
Ch andrasekaran, M., Karayanan, K., Upadhyaya, S.: Towards Phishing E-Mail ...
Graham, P.: Better Bayesian Filtering. In: Spam Conference (2003) ...
Rigoutsos, I. , Chung-kwei, T.: A P attern -Discovery-B ased ...
Mail Messages (Spam). In: First Conference on Email and Anti-Spam ...
Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian ...
Airoldi, E., Malin, B.: Data Mining Challenges For ...
Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails. ...
Fette, I., Sadeh, N., Tomasic, A.: Learning to Detect Phishing ...
Kolcz, A., Bond, M., Sargent, J.: The Challenges Of Service-Side ...
Top Ten Reviews.: Spam Statistics 2006, http ://spam-filter- review .toptenreviews ...
Drake, C. E., Oliver, J., Koontz, E.: Anatomy of a ...
Lowd D., Meek, C.: Good Word Attacks On Statistical Spam ...
Airoldi, E., Cohen, W.: Bayesian Models For Frequent Terms In ...
Cortes, C., Vapnik, V.: S upport-Vector Networks. Machine Learning, 20, ...
Day, E.: Consensus Methods as Tools for Data Analysis. In ...
Van der Walt, C.M., Barnard, E.: Data C haracteristics That ...
Littlestone, N., Warmuth, M.: Weighted Majority ...
Algorithm. Information and Computation, 108, 212--261 (1994) ...
Domingos, P., Pazzani, M.: On the Optimality Of The Simple ...
Huang, Y. S., Suen, C. Y.: A Method Of Combining ...
Hershkop, S., Stolfo, S.: Combining Email Models For False Positive ...
FraudWatch International: Company Phishing Index, http://www _ fraudvw atchinternation al ...
Klimt, B., Yang, Y.: The Enron Corpus: A New Dataset ...
Metsis, V., Androutsopo ulos, I., Paliouras, G.: Spam Filtering with ...
Anti-Phishing Working Group, http : //www _ antiphi shing.org/ ...
M. Porter. The Porter Stemming Algorithm. http : //www _ ...
نمایش کامل مراجع