3MA J, SAUL L K, SAVAGE S, et al. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs[C]//ACM SIGMOD. International Conference on Knowledge Discovery & Data Mining, June 28-July 1, 2009, Paris, France. New York: Association for Computing Machinery, 2009: 1245-1254.
4GARERA S, PROVOS N, CHEW M, et al. A Framework for Detection and Measurement of Phishing Attacks[C]// ACM SIGSAC. 2007 ACM Workshop on Recurring Malcode. Alexandria, VA, United states. New York : Association for Computing Machinery, 2007: 1-8.
5LEO Breiman, JEROME Friedman, CHARLES J, et al. Classification and Regression Trees (CART)[M]. New York: Chapman & Hall, 1984.
6KEERTHI S S, SHEVADE S K, BHATTACHARYYA C, et al. Improvements to Platt's SMO Algorithm for SVM Classifier Design[J]. Neural Computation, 2001, 13(3): 637-649.
7SUYKENS J A K, VANDEWALLE J. Least Squares Support Vector Machine Classifiers[J]. Neural processing letters, 1999, 9(3): 293-300.