This paper describes a novel approach to profiling phishing emails based on the combination of multi- ple independent clusterings of the email documents. Each clustering is motivated by a natural representa- tion of the emails. A data set of 2048 phishing emails provided by a major Australian financial institution was pre-processed to extract features describing the textual content, hyperlinks and orthographic struc- ture of the emails. Independent clusterings using dif- ferent techniques were performed on each representa- tion, and these clusterings were then ensembled using a variety of consensus functions. This paper concen- trates on using several clustering approaches to de- termine the most likely number of phishing group...
Spam emails are a major tool for criminals to distribute malware, conduct fraudulent activity, sell ...
Spam email automated analysis and classification are a challenging task, which is vital in the ident...
This paper proposes an intelligent model for detection of phishing emails which depends on a preproc...
This paper describes a novel approach to profiling phishing emails based on the combination of multi...
Phishing attacks continue unabated to plague Internet users and trick them into providing personal a...
Attackers attempt to create successful phishing campaigns by sending out trustworthy-looking emails ...
This article presents experimental results devoted to a new application of the novel clustering tech...
This article investigates internet commerce security applications of a novel combined method, which ...
After phishing message detection, determining the provenance of phishing messages and Websites is th...
The rapid growth of spam email attacks and the inherent malicious dynamism within those attacks on a...
This article is devoted to experimental investigation of a novel application of a clustering techniq...
Phishing activity has recently been focused on social networking sites as a more effective way of ex...
Phishing webpages present a previously underused resource for information on determining provenance ...
Email is the most common and comparatively the most efficient means of exchanging information in tod...
Spam email automated analysis and classification are a challenging task, which is vital in the ident...
Spam emails are a major tool for criminals to distribute malware, conduct fraudulent activity, sell ...
Spam email automated analysis and classification are a challenging task, which is vital in the ident...
This paper proposes an intelligent model for detection of phishing emails which depends on a preproc...
This paper describes a novel approach to profiling phishing emails based on the combination of multi...
Phishing attacks continue unabated to plague Internet users and trick them into providing personal a...
Attackers attempt to create successful phishing campaigns by sending out trustworthy-looking emails ...
This article presents experimental results devoted to a new application of the novel clustering tech...
This article investigates internet commerce security applications of a novel combined method, which ...
After phishing message detection, determining the provenance of phishing messages and Websites is th...
The rapid growth of spam email attacks and the inherent malicious dynamism within those attacks on a...
This article is devoted to experimental investigation of a novel application of a clustering techniq...
Phishing activity has recently been focused on social networking sites as a more effective way of ex...
Phishing webpages present a previously underused resource for information on determining provenance ...
Email is the most common and comparatively the most efficient means of exchanging information in tod...
Spam email automated analysis and classification are a challenging task, which is vital in the ident...
Spam emails are a major tool for criminals to distribute malware, conduct fraudulent activity, sell ...
Spam email automated analysis and classification are a challenging task, which is vital in the ident...
This paper proposes an intelligent model for detection of phishing emails which depends on a preproc...