https://scholars.lib.ntu.edu.tw/handle/123456789/413117
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lee L.-H. | en_US |
dc.contributor.author | Lee K.-C. | en_US |
dc.contributor.author | Juan Y.-C. | en_US |
dc.contributor.author | Chen H.-H. | en_US |
dc.contributor.author | HSIN-HSI CHEN | en_US |
dc.creator | Lee L.-H.;Lee K.-C.;Juan Y.-C.;Chen H.-H.;Tseng Y.-H. | - |
dc.date.accessioned | 2019-07-10T08:11:17Z | - |
dc.date.available | 2019-07-10T08:11:17Z | - |
dc.date.issued | 2014 | - |
dc.identifier.isbn | 9781450327459 | - |
dc.identifier.uri | https://scholars.lib.ntu.edu.tw/handle/123456789/413117 | - |
dc.description.abstract | This study explores the users' web browsing behaviors that confront phishing situations for context-aware phishing detection. We extract discriminative features of each clicked URL, i.e., domain name, bag-of-words, generic Top-Level Domains, IP address, and port number, to develop a linear chain CRF model for users' behavioral prediction. Large-scale experiments show that our method achieves promising performance for predicting the phishing threats of users' next accesses. Error analysis indicates that our model results in a favorably low false positive rate. In practice, our solution is complementary to the existing anti-phishing techniques for cost-effectively blocking phishing threats from users' behavioral perspectives. ? Copyright 2014 by the International World Wide Web Conferences Steering Committee. | - |
dc.language | English | - |
dc.relation.ispartof | 23rd International Conference on World Wide Web | - |
dc.subject | Behavioral analysis | - |
dc.subject | Category prediction | - |
dc.subject | Context-aware detection | - |
dc.subject.classification | [SDGs]SDG16 | - |
dc.subject.other | Forecasting; Information retrieval; World Wide Web; Behavioral analysis; Browsing behavior; Context-Aware; Discriminative features; False positive rates; Large scale experiments; Phishing detections; Top level domains; Computer crime | - |
dc.title | Users' behavioral prediction for phishing detection | en_US |
dc.type | conference paper | en |
dc.identifier.doi | 10.1145/2567948.2577320 | - |
dc.identifier.scopus | 2-s2.0-84990942800 | - |
dc.identifier.url | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84990942800&doi=10.1145%2f2567948.2577320&partnerID=40&md5=5b8d4b29594c8638285ef475d41a856e | - |
dc.relation.pages | 337-338 | - |
item.openairetype | conference paper | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
crisitem.author.dept | Networking and Multimedia | - |
crisitem.author.dept | Computer Science and Information Engineering | - |
crisitem.author.dept | Networking and Multimedia | - |
crisitem.author.dept | Computer Science and Information Engineering | - |
crisitem.author.orcid | 0000-0001-9757-9423 | - |
crisitem.author.orcid | 0000-0001-9757-9423 | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 資訊工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。