1MA J, SAUL L K, SAVAGE S, et al. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs[C]//ACM SIGMOD. International Conference on Knowledge Discovery & Data Mining, June 28-July 1, 2009, Paris, France. New York: Association for Computing Machinery, 2009: 1245-1254.
2GARERA S, PROVOS N, CHEW M, et al. A Framework for Detection and Measurement of Phishing Attacks[C]// ACM SIGSAC. 2007 ACM Workshop on Recurring Malcode. Alexandria, VA, United states. New York : Association for Computing Machinery, 2007: 1-8.
3LEO Breiman, JEROME Friedman, CHARLES J, et al. Classification and Regression Trees (CART)[M]. New York: Chapman & Hall, 1984.
4KEERTHI S S, SHEVADE S K, BHATTACHARYYA C, et al. Improvements to Platt's SMO Algorithm for SVM Classifier Design[J]. Neural Computation, 2001, 13(3): 637-649.
5SUYKENS J A K, VANDEWALLE J. Least Squares Support Vector Machine Classifiers[J]. Neural processing letters, 1999, 9(3): 293-300.
8WANG Wei1,2,3 & ZENG GuoSun1,2,31Department of Computer Science & Technology, Tongji University, Shanghai 200092, China,2Tongji Branch, National Engineering & Technology Center of High Performance Computer, Shanghai 200092, China 3Key Loboratory of Embedded System and Service Computing, Ministry of Education, Shanghai 200092, China.Bayesian cognitive trust model based self-clustering algorithm for MANETs[J].Science China(Information Sciences),2010,53(3):494-505. 被引量:6