共 53 条
- [1] Iterative construction of hierarchical classifiers for phishing website detection [J]. J. Netw., 8 (2089-2098):
- [2] Abdi L, 2013, LECT NOTES COMPUT SC, V7802, P246, DOI 10.1007/978-3-642-36546-1_26
- [4] Alazab M., 2011, AusDM, V11, P171, DOI DOI 10.5555/2483628.2483648
- [5] A Survey of Phishing Email Filtering Techniques [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2070 - 2090
- [6] Almomani Ammar, 2012, INT J DIGIT CONTENT, V6, P119, DOI 10.4156/JDCTA.VOL6.ISSUE18.14,2012
- [8] [Anonymous], PHISH ACT TRENDS REP
- [10] Bhowan U, 2011, LECT NOTES ARTIF INT, V7106, P192, DOI 10.1007/978-3-642-25832-9_20