2HongJ. The State of Phishing Attacks[J].Communications of the ACM,2012,(01):74-81.
3Topkara M,Kamra A,Atallah M J. ViWiD:Visible Watermarking Based Defense Against Phishing[A].Siena,Italy:Springer-Verlag Berlin Heidelberg,2005.470-483.
4Steel C M S,Lu C. Impersonator identificaition through dynamic Fin?gerptinting[J].Digital Investigations,2008,(02):60-70.
5Ma J,Saul L K,Savage S. Learning to Detect Malicious URIs[J].ACM Transactions on Intelligent Systems and Technology,2011,(03):1-30.
6He M,Horng S,Fan P. An Efficient Phishing Webpage Detector[J].Expert Systems with Applications,2011,(10):12018-12027.
7Xiang G,Hong J,Cranor L. CANTINA+ Feature-rich Machine Learning Framework for Detecting Phishing Web Sites[J].ACM Transactions on Information and System Security,2011,(02):21-48.
8Zhang H,Liu G,Chow T W S. Textual and Visual ConteritBased Anti-Phishing:A Bayesian Approach[J].IEEE Transactions on Neural Networks,2011,(10):1532-1546.
9Abbasi A,Zhang Z,Zimbra D. Detecting Fake Websites:The Contribution of Statisitical Learning Theory[J].MIS Quarterly,2010,(03):1-28.
10Chen T,Dick S,Miller J. Detecting Visually Similar Web pages:Application to Phishing Detection[J].ACM Transactions on Internet Technology,2010,(02):1-38.