参考文献
|
-
蔡良庭、楊志堅(2004)。學習向量量化網路分類之模擬研究。測驗統計年刊,12,269-291。
連結:
-
Computer Security Institute (2009). CSI Computer Crime and Security Survey Executive Summary. Retrieved January 8, 2010, from the World Wide Web:http://pathmaker.biz/whitepapers/CSISurvey2009.pdf
-
Computer Security Institute (2007). CSI Computer Crime and Security Survey.Retrieved April 30, 2009, from the World Wide Web:http://www.cse.msstate.edu/~cse6243/readings/CSISurvey2007.pdf
-
Computer Security Institute (2008). CSI Computer Crime and Security Survey.Retrieved April 30, 2009, from the World Wide Web:http://www.cse.msstate.edu/~cse6243/readings/CSIsurvey2008.pdf
-
Symantec (2010), Symantec Intelligence Quarterly: Global Report (April–June2010). Retrieved November 26, 2010, from the World Wide Web:http://www.symantec.com/content/en/us/enterprise/other_resources/b-symc_intelligence_quarterly_apr-jun_2010_21072009.en-us.pdf
-
資策會產業情報研究所(2010 年11 月23 日)。「端裝置、雲服務、雲建置」雲端運算牽動九大關鍵軟體市場。2010 年12 月26 日, 取自:http://mic.iii.org.tw/aisp/pressroom/press01_pop.asp?sno=234&type1=2
-
Kaspersky (2010, Nov. 10). Kaspersky Spam in the Third Quarter of 2010. Retrieved December 15, 2010, from the World Wide Web:http://www.securelist.com/en/analysis/204792147/Spam_in_the_Third_Quarter_of_2010
-
Aburrous, M.,Hossain, M.A.,Dahal, K.,Thabtah, F.(2010).Intelligent Phishing Detection System for e-banking using Fuzzy Data Mining.Expert Systems with Applications,37(12),7913-7921.
-
Agrawal, R.,Srikant, R.(1994).Fast Algorithms for Mining Association Rules.Proceedings of the 20th Very Large Data Bases Conference
-
Agrawal, R.,Srikant, R.(1995).Mining Sequential Patterns.Proceedings of the 11th International Conference on Data Engineering
-
Breiman, L.(2001).Random Forests.Machine Learning,45(1),5-32.
-
Breiman, L.,Friedman, J.H.,Olshen , R.A.,Stone, C.J.(1984).Classification and Regression Trees.Belmont:Wadsworth Belmont Group.
-
Cao, Y.,Han, W.,Le, Y.(2008).Anti-phishing Based on Automated Individual White-List.Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM'08)
-
Caporaletti, L.E.,Dorsey, R.E.,Johnson, J.D.,Powell, W.A.(1994).A Decision Support System for In-Sample Simultaneous Equation Systems Forecasting Using Artificial Neural Systems.Decision Support Systems,11(5),481-495.
-
Chen, X.,Bose, I.,Alvin, C.M.L.,Guo, C.(2010).Assessing the severity of phishing attacks: A hybrid data mining approach.Decision Support Systems,50(4),662-672.
-
Chipman, H.A.,George, E.I.,McCulloch, R.E.(2006).BART: Bayesian Additive Regression Trees.Canada:Department of Mathematics and Statistics, Acadia University.
-
Fette, I.,Sadeh, N.,Tomasic, A.(2007).Learning to detect phishing emails.Proceedings of the 16th international conference on World Wide Web
-
Han, J.,Pei, J.,Mortazavi-Asl, B.,Chen, Q.,Dayal, U.,Hsu, M.(2000).FreeSpan:frequent pattern-projected sequential pattern mining.Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Jo, I.,Jung, EJ,Yeom, H.Y.(2010).You' re not who you claim to be: website identity check for phishing detection.Proceedings of 19th International Conference on Computer Communications and Networks
-
Michie, D.(Ed.)(1979).Expert Systems in the Microelectronic age.Edinburgh, Scotland:Edinburgh University.
-
Mitchell, T.M.(1997).Machine Learning.New York:McGraw-Hill.
-
Pan, Y.,Ding, X.(2006).Anomaly based Web Phishing Page Detection.Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
-
Pei, J.,Han, J.,Mortazavi-Asl, B.,Pinto, H.(2001).PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth.Proceedings of the 17th International Conference on Data Engineering
-
Quinlan J.R.(1993).C4.5: Programs for machine learning.San Francisco:Morgan Kaufmann.
-
Ravi, V.,Kurniawan, H.,Thai, Peter Nwee Kok,Kumar, P.R.(2008).Soft computing system for bank performance prediction.Applied Soft Computing,8(1),305-315.
-
Srikant, R.,Agrawal, R.(1996).Mining Sequential Patterns: Generalizations And Performance Improvements.Proceedings of the 5th International Conference Extending Database Technology, EDBT
-
Toolan, F.,Carthy, J.(2009).Phishing Detection using Classifier Ensembles.Proceedings of the 4th annual Anti-Phishing Working Groups eCrime Researchers Summit
-
陳青島(2008)。碩士論文(碩士論文)。國立臺灣科技大學資訊工程研究所。
|