Login / Signup
Evaluating a semisupervised approach to phishing url identification in a realistic scenario.
Binod Gyawali
Thamar Solorio
Manuel Montes-y-Gómez
Brad Wardman
Gary Warner
Published in:
CEAS (2011)
Keyphrases
</>
semi supervised
website
real life
email
real world
web pages
spam filtering
data mining
countermeasures
machine learning
learning algorithm
automatic identification
identity theft