Author:
Abawajy Jemal,Kelarev Andrei
Publisher
Springer Berlin Heidelberg
Reference38 articles.
1. APWG: Anti-Phishing Working Group, http://apwg.org/ (accessed June 10, 2012)
2. Beliakov, G., Yearwood, J., Kelarev, A.: Application of rank correlation, clustering and classification in information security. Journal of Networks 7, 935–955 (2012)
3. Breiman, L.: Bagging predictors. Machine Learning 24, 123–140 (1996)
4. Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1–27:27 (2011), software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
5. Lecture Notes in Computer Science;R. Dazeley,2010
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献