共 16 条
[1]
VisualPhishNet: Zero-Day PhishingWebsite Detection by Visual Similarity
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1681-1698
[2]
Abu-Nimeh S., 2007, eCrime '07, DOI [10.1145/1299015.1299021, DOI 10.1145/1299015.1299021]
[3]
Cao Y., 2008, DIM '08, P51
[5]
Jain Ankit Kumar, 2018, Cyber Security. Proceedings of CSI 2015. Advances in Intelligent Systems and Computing (AISC 729), P467, DOI 10.1007/978-981-10-8536-9_44
[6]
Feature Selections for the Classification of Webpages to Detect Phishing Attacks: A Survey
[J].
2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020),
2020,
:365-373
[7]
Robust intra-document locations
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
2000, 33 (1-6)
:105-118
[8]
Prakash P, 2010, IEEE INFOCOM SER
[10]
"Why Should I Trust You?" Explaining the Predictions of Any Classifier
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:1135-1144