2013 Eighth Asia Joint Conference on Information Security 2013
DOI: 10.1109/asiajcis.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…, [29], [67], [70], [77], [78], [85] ≥4 5 [21], [41], [49], [89], [68] We next describe the different evaluation metrics used in phishing URL detection papers.…”
Section: ) Dataset Sources and Availability: Inmentioning
confidence: 99%
See 3 more Smart Citations
“…, [29], [67], [70], [77], [78], [85] ≥4 5 [21], [41], [49], [89], [68] We next describe the different evaluation metrics used in phishing URL detection papers.…”
Section: ) Dataset Sources and Availability: Inmentioning
confidence: 99%
“…Recall F-score 20 [30], [33]- [35], [47], [58]- [60], [69], [86] [22], [29], [50]- [52], [62]- [64], [70], [89] Error Rate 13 [21], [28], [34], [39], [40], [43], [49] [38], [65], [67], [73], [85], [89] Confusion Matrix a 20 [35], [43]- [46], [48], [57], [69], [76], [80], [82] [29], [50], [51], [58], [66], [78], [79], [88], [89] Area Under Curve 4 [33], [35], [50], [51] Others b 6 [42], [57],…”
Section: ] Precisionmentioning
confidence: 99%
See 2 more Smart Citations
“…Su et al described a method that intends to learn the properties from multiple portions of URLs to assign the suspicion level of each portion. After the adjustment of suspicion threshold of each portion, the system would choose the most suspicious URL [11].…”
Section: Existing Approachesmentioning
confidence: 99%