Author of the publication

A distributed architecture for phishing detection using Bayesian Additive Regression Trees.

, , , and . eCrime, page 1-10. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Privacy Requirements into Security Requirements Engineering., , and . SEKE, page 542-547. Knowledge Systems Institute Graduate School, (2009)Bypassing Security Toolbars and Phishing Filters via DNS Poisoning., and . GLOBECOM, page 2001-2006. IEEE, (2008)Lessons from Stuxnet., and . Computer, 44 (4): 91-93 (2011)Privacy Risk Assessment in Privacy Requirements Engineering., and . RELAW, page 17-18. IEEE Computer Society, (2009)Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy., , , and . ARES, page 1044-1051. IEEE Computer Society, (2008)A comparison of machine learning techniques for phishing detection., , , and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 60-69. ACM, (2007)Circumventing security toolbars and phishing filters via rogue wireless access points., and . Wirel. Commun. Mob. Comput., 10 (8): 1128-1139 (2010)A distributed architecture for phishing detection using Bayesian Additive Regression Trees., , , and . eCrime, page 1-10. IEEE, (2008)Avoiding Denial of Service via Stress Testing., , and . AICCSA, page 300-307. IEEE Computer Society, (2006)Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees., , , and . ICC, page 1-5. IEEE, (2009)