- S. S. Silva, R. M. Silva, and R. C. Pinto, “Botnets: A survey,” Computer Networks, vol. 57, no. 2, pp.
- -403, 2013.
- A. Cole, M. Michael, and D. Noyes, “Botnets: The rise of the machines,” In Proceedings on the 6th Annual Security Conference, 2007.
- M. Khonji, Y. Iraqi, and A. Jones, “Phishing Detection: A Literature Survey,” IEEE Communications Surveys & Tutorials, vol. 15, 2013.
- H. Rouhani, “Detection of Phishing Websites Using Fast Flux Service Networks (Master's thesis),” Sharif University of Technology, 2010.
- PhishTank [Internet]. PhishTank; [cited 2016 May 27]. Available from: http://www.phishtank.com.
- A. Ramachandran, “Fishing for Phishing from the Network Stream,” Georgia Tech. CSS Technical Report GT-CS-08-08, 2008.
- D. Ken, “Mobile Malware Attacks and Defense,” Syngress Publishing, 2009.
- Gartner [Internet]. Gartner: [cited 2016 May 27]. Available from: http://www.gartner.com.
- Symantec, “Internet Security Threat Report,” Symantec, 2014
- M. Aburrous, “Predicting Phishing Websites using Classification Mining Techniques with Experimental Case Studies,” In Proceedings on the 7th International Conference on Information Technology, IEEE, 2010.
- P. Prakash, “Phishnet: predictive blacklisting to detect phishing attacks,” In Proceedings of the 29th conference on Information communications, pp. 346–350, 2010.
- N. Chou, “Client-side defense against web-based identity theft,” The Internet Society conference [NDSS], 2004.
- C. V. Zhou, “A self-healing self-protecting collaborative intrusion detection architecture to traceback fast-flux phishing domains,” NOMS Workshops, IEEE, 2008.
- P. Likarish, D. Dunbar, and T. E. Hansen, “B-apt: Bayesian anti-phishing toolbar,” IEEE International Conference on Communications, 2008.
- Y. Zhang, J. I. Hong, and L. F. Cranor, “Cantina: a content-based approach to detecting phishing web sites,” Proceedings of the 16th international conference on World Wide Web, New York, USA, pp. 639–648, 2007.
- M. Sharifi and S. H. Siadati, “A Phishing Sites Blacklist Generator,” IEEE, 2008.
- P. Singh and M. D. Patil, “Identification of Phishing Web Pages and Target Detection,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 3, 2014.
- L. A. T. Nguyen, “A Novel Approach for Phishing Detection Using URL-Based Heuristic,” IEEE, 2014.
- R. Panda and R. Tiwari, “Protection from Phishing Attacks by Exploiting Page Rank,Reputation and Source Code of the Webpage,” India : International Journal of Advanced Research in Computer Science and Software Engineering, 2014.
- M. Hara, A. Yamada, and Y. Miyake, “Visual similarity-based phishing detection without victim site information,” IEEE Symposium on Computational Intelligence in Cyber Security, pp. 30-36, 2009.
- K. Chen, “Fighting phishing with discriminative keypoint features,” Internet Computing, IEEE, vol. 13, pp. 56-63, 2009.
- H. Zhang, “Textual and visual contentbased anti-phishing: A bayesian approach,” IEEE Transactions on Neural Networks, vol. 22, pp. 1532 –1542, 2011.
- C. Whittaker, B. Ryner, and M. Nazif, “Large-scale automatic classification of phishing pages,” NDSS, vol. 10, 2010.
- P. Likarish, D. Dunbar, and T. E. Hansen, “B-apt: Bayesian anti-phishing toolbar,” IEEE International Conference on Communications, 2008.
- G. Liu, B. Qiu, and L. Wenyin, “Automatic detection of phishing target from phishing webpage,” 20th International Conference on Pattern Recognition (ICPR), pp. 4153-4156, 2010.
|