|
[1] The alexa website. [2] The wot website. [3] The apwg website, 2013. [4] D. Aha and D. Kibler. Instance-based learning algorithms. Machine Learning, 6:37–66, 1991. [5] R. B. Basnet, A. H. Sung, and Q. Liu. Learning to detect phishing urls. 2014. [6] A. Blum, B. Wardman, T. Solorio, and G. Warner. Lexical feature based phishing url detection using online learning. In Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, pages 54–60. ACM, 2010. [7] L. Breiman. Bagging predictors. Machine Learning, 24(2):123–140, 1996. [8] R. A.-F. C. Center. Rsa monthly online fraud report, 2012. [9] Y. Chen, H. Liu, Y. Yu, and P. Wang. Detecting phishing by checking content consistency. In Information Reuse and Integration, 2014. IRI 2014. IEEE International Conference on, 2014. [10] N. Chou, R. Ledesma, Y. Teraguchi, J. C. Mitchell, et al. Client-side defense against web-based identity theft. In NDSS, 2004. [11] J. G. Cleary, L. E. Trigg, et al. K*: An instance-based learner using an entropic distance measure. In ICML, pages 108–114, 1995. [12] W. W. Cohen. Fast effective rule induction. In Twelfth International Conference on Machine Learning, pages 115–123. Morgan Kaufmann, 1995. [13] G. Demiroz and A. Guvenir. Classification by voting feature intervals. In 9th European Conference on Machine Learning, pages 85–92. Springer, 1997. [14] L. Dong, E. Frank, and S. Kramer. Ensembles of balanced nested dichotomies for multi-class problems. In PKDD, pages 84–95. Springer, 2005. [15] E. Frank and M. Hall. A simple approach to ordinal classification. In 12th European Conference on Machine Learning, pages 145–156. Springer, 2001. [16] E. Frank, G. Holmes, R. Kirkby, and M. Hall. Racing committees for large datasets. In Proceedings of the 5th International Conferenceon Discovery Science, pages 153–164. Springer, 2002. [17] E. Frank and S. Kramer. Ensembles of nested dichotomies for multi-class problems. In Twenty-first International Conference on Machine Learning. ACM, 2004. [18] E. Frank and I. H. Witten. Generating accurate rule sets without global optimization. In J. Shavlik, editor, Fifteenth International Conference on Machine Learning, pages 144–151. Morgan Kaufmann, 1998. [19] Y. Freund and R. E. Schapire. Experiments with a new boosting algorithm. In Thirteenth International Conference on Machine Learning, pages 148–156, San Francisco, 1996. Morgan Kaufmann. [20] Y. Freund and R. E. Schapire. Large margin classification using the perceptron algorithm. In 11th Annual Conference on Computational Learning Theory, pages 209–217, New York, NY, 1998. ACM Press. [21] J. Friedman, T. Hastie, and R. Tibshirani. Additive logistic regression: a statistical view of boosting. Technical report, Stanford University, 1998. [22] M. Hall and E. Frank. Combining naive bayes and decision tables. In Proceedings of the 21st Florida Artificial Intelligence Society Conference (FLAIRS), pages 318–319. AAAI press, 2008. [23] R. Holte. Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11:63–91, 1993. [24] P. Hsu, P. Liu, and Y. Chen. Using ontology to map categories in blog. In AIDM ’06 Proceedings of the International Workshop on Integrating AI and Data Mining, pages 65–72, 2006. [25] G. H. John and P. Langley. Estimating continuous distributions in bayesian classifiers. In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, pages 338–345. Morgan Kaufmann Publishers Inc., 1995. [26] R. Kohavi. The power of decision tables. In 8th European Conference on Machine Learning, pages 174–189. Springer, 1995. [27] N. Landwehr, M. Hall, and E. Frank. Logistic model trees. 95(1-2):161–205, 2005. [28] S. le Cessie and J. van Houwelingen. Ridge estimators in logistic regression. Applied Statistics, 41(1):191–201, 1992. [29] L. Lee and Y. Chen. Clustering user queries into conceptual spaces. M. eng. thesis, National Tsing Hua University, Hsinchu, Taiwan, Aug. 2010. [30] V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. In Soviet physics doklady, volume 10, page 707, 1966. [31] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond blacklists: learning to detect malicious web sites from suspicious urls. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1245–1254. ACM, 2009. [32] J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Identifying suspicious urls: an application of large-scale online learning. In Proceedings of the 26th Annual International Conference on Machine Learning, pages 681–688. ACM, 2009. [33] P. Melville and R. J. Mooney. Constructing diverse classifier ensembles using artificial training examples. In Eighteenth International Joint Conference on Artificial Intelligence, pages 505–510, 2003. [34] P. Melville and R. J. Mooney. Creating diversity in ensembles using artificial data. Information Fusion: Special Issue on Diversity in Multiclassifier Systems, 2004. submitted. [35] J. Pearl. Bayesian netwcrks: A model cf’ self-activated memory for evidential reasoning. 1985. [36] J. Platt. Fast training of support vector machines using sequential minimal optimization. In B. Schoelkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning. MIT Press, 1998. [37] P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta. Phishnet: predictive blacklisting to detect phishing attacks. In INFOCOM, 2010 Proceedings IEEE, pages 1–5. IEEE, 2010. [38] J. J. Rodriguez, L. I. Kuncheva, and C. J. Alonso. Rotation forest: A new classifier ensemble method. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(10):1619–1630, 2006. [39] D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Learning internal representations by error propagation. Technical report, DTIC Document, 1985. [40] M. Sumner, E. Frank, and M. Hall. Speeding up logistic model tree induction. In 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, pages 675–683. Springer, 2005. [41] K. M. Ting and I. H. Witten. Stacking bagged and dagged models. In D. H. Fisher, editor, Fourteenth international Conference on Machine Learning, pages 367–375, San Francisco, CA, 1997. Morgan Kaufmann Publishers. [42] C. Whittaker, B. Ryner, and M. Nazif. Large-scale automatic classification of phishing pages. In NDSS, 2010. [43] Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: A content-based approach to detecting phishing web sites. In WWW ’07 Proceedings of the 16th international conference on World Wide Web, pages 639–648, 2007. |