the data by single researcher. In other words, it
requires some other groups’ cooperation to collect
the data. In this area, there is more new work to be
done and other new techniques should be integrated.
However, we believe this model is a good starting
for other users to further their research in
ecommerce anti-phishing.
REFERENCES
Adida, B., Hohenberger, S. & Rivest, R., (2005). Fighting
Phishing Attacks:A Lightweight Trust Architecture fro
Detecting Spoofed Emails. In DIMACS Wkshp on
Theft in E-Commerce.
Anti-Phishing Working Group (2007). Phishing Activity
Trends Report. Available from www.antiphishing.org/
reports/apwg_report_april_2007.pdf
Bridges, S. M. & Vaughn, R. B., (2001). Fuzzy data
mining and genetic algorithms applied to intrusion
detection. Department of Computer Science
Mississippi State University, White Paper.
Cendrowska, J., (1987). PRISM: An algorithm for
inducing modular rules. International Journal of Man
–
Machine Studies, 27(4), 349–370.
Ciesielski Vic & Lalani Anand (In press). Data mining of
web access logs from an academic web site. In
Proceedings of the third international conference on
hybrid intelligent systems (HIS
’
03): Design and
Application of Hybrid Intelligent Systems (pp. 1034–
1043). IOS Press.
Dhamija, R. & Tygar, J. D., (2005). The battle against
phishing: Dynamic security skins. In Proceeding s of
the 2005 symposium on Usable Privacy and Security.
Han, E. & Karypis, G., (2000). Centroid-based document
classification: Analysis and experimental results.
Principles of Data Mining and Knowledge Discovery,
424–431.
FDIC (2004). Putting an end to account – hijacking
identity theft. Available from http://www.fdic.gov/
consumers/consumer/idtheftstudy/identity_theft.pdf
Herzberg, A. & Gbara, A., (2004). TrustBar: Protecting
(even naive) web users from spoofing and phishing
attacks. Draft of July, 11.
Ho, C. Y., Ling, B. W. & Reiss, J. D., (2006). Fuzzy
impulsive control of high-order interpolative low-pass
sigma – delta modulators. IEEE Transactions on
Circuits and Systems–I: Regular Papers, 53(10).
James, L., (2006). Phishing exposed. Tech target article
sponsored by: Sunbelt software.
J. R. Quinlan (1996). Improved use of continuous
attributes in c4.5. Journal of Artificial Intelligence
Research, 4, 77–90.
Liu, B., Hsu, W. & Ma, Y., (1998). Integrating
classification and association rule mining. In
Proceedings of the fourth international conference on
knowledge discovery and data mining. KDD-98,
Plenary Presentation. New York, USA
Liu, M., Chen, D. & Wu, C., (2002). The continuity of
Mamdani method. International Conference on
Machine Learning and Cybernetics, 3, 1680–1682.
Liu, W., Deng, X., Fu, A. Y., (2006). Detecting phishing
web pages with visual similarity assessment based on
earth mover’s distance (EMD). IEEE Internet
Computing, 3(4)(pp. 58-65).
Liu, W., Deng, X., Huang, G. & Fu, A. Y., (2006). An anti-
phishing strategy based on visual similarity
assessment, published by the IEEE computer society
(pp. 58-65). Internet Computing IEEE.
Liu, W., Huang, G., Liu, X., Zhang, M. & Deng, X.,
(2005). Phishing Web Page Detection. In Proceeding
of eighth International conference on documents
analysis and recognition (pp. 560–564).
Misch, S., (2006). Content negotiation in Internet mail.
Diploma thesis. University of Applied Sciences
Cologne, Mat. No.: 7042524.
Netcraft (2004). Available from http://toolbar.netcraft.com.
Olsen, S., (2004). AOL tests caller ID for e-mail.
Pan, Y. & Ding, X., (2006). Anomaly based web phishing
page detection. In Proceedings of the 22nd annual
computer security applications conference.
Wu, M., Miller, R. C. & Garfinkel, S. L., (2006a). Do
Security Toolbars Actually Prevent Phishing Attacks?
In Proceedings of the SIGCHI Conference on Human
Factors in Computing System
.
Wu, M., Miller, R. C. & Little, G., (2006b). Web wallet:
Preventing phishing attacks by revealing user
intentions. In Proceeding s of the Symposium on
Usable Privacy and Security.
ICEIS 2011 - 13th International Conference on Enterprise Information Systems
404