@inproceedings{ndss10_google,
title = {Large-Scale Automatic Classification of Phishing Pages},
author  = {Colin Whittaker and Brian Ryner and Marria Nazif},
year  = 2010,
URL = {http://www.isoc.org/isoc/conferences/ndss/10/pdf/08.pdf},
booktitle = {NDSS '10}
}
@inproceedings{www07_zhang,
  author = {Zhang, Yue and Hong, Jason and Cranor, Lorrie},
  biburl = {http://www.bibsonomy.org/bibtex/22cb49719bddcefae40eb87844fe53a36/liangzk},
  file = {zhang07www.pdf:www/2007/zhang07www.pdf:PDF},
  interhash = {f1bd06bc5ae9bd43e1253e086f9f18de},
  intrahash = {2cb49719bddcefae40eb87844fe53a36},
  keywords = {phishing},
  timestamp = {2010-10-27T03:40:56.000+0200},
  title = {{CANTINA}: A Content-Based Approach to Detecting Phishing Web Sites},
  year = 2007
}
@ARTICLE{Jones72_tfidf,
    author = {Karen Spärck Jones},
    title = {A statistical interpretation of term specificity and its application in retrieval},
    journal = {Journal of Documentation},
    year = {1972},
    volume = {28},
    pages = {11--21}
}
@article{Freund1997119,
title = "A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting ",
journal = "Journal of Computer and System Sciences ",
volume = "55",
number = "1",
pages = "119 - 139",
year = "1997",
note = "",
issn = "0022-0000",
doi = "http://dx.doi.org/10.1006/jcss.1997.1504",
url = "http://www.sciencedirect.com/science/article/pii/S002200009791504X",
author = "Yoav Freund and Robert E Schapire"
}
@incollection{scai08_basnet,
year={2008},
isbn={978-3-540-77464-8},
booktitle={Soft Computing Applications in Industry},
volume={226},
series={Studies in Fuzziness and Soft Computing},
editor={Prasad, Bhanu},
doi={10.1007/978-3-540-77465-5_19},
title={Detection of Phishing Attacks: A Machine Learning Approach},
url={http://dx.doi.org/10.1007/978-3-540-77465-5_19},
publisher={Springer Berlin Heidelberg},
author={Basnet, Ram and Mukkamala, Srinivas and Sung, AndrewH.},
pages={373-383}
}
@incollection{anip2009_miyamoto,
year={2009},
isbn={978-3-642-02489-4},
booktitle={Advances in Neuro-Information Processing},
volume={5506},
series={Lecture Notes in Computer Science},
editor={Köppen, Mario and Kasabov, Nikola and Coghill, George},
doi={10.1007/978-3-642-02490-0_66},
title={An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites},
url={http://dx.doi.org/10.1007/978-3-642-02490-0_66},
publisher={Springer Berlin Heidelberg},
author={Miyamoto, Daisuke and Hazeyama, Hiroaki and Kadobayashi, Youki},
pages={539-546}
}
@inproceedings{cml2007_abu,
 author = {Abu-Nimeh, Saeed and Nappa, Dario and Wang, Xinlei and Nair, Suku},
 title = {A Comparison of Machine Learning Techniques for Phishing Detection},
 booktitle = {Proceedings of the Anti-phishing Working Groups 2Nd Annual eCrime Researchers Summit},
 series = {eCrime '07},
 year = {2007},
 isbn = {978-1-59593-939-5},
 location = {Pittsburgh, Pennsylvania},
 pages = {60--69},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/1299015.1299021},
 doi = {10.1145/1299015.1299021},
 acmid = {1299021},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {BART, CART, NNet, SVM, classification, logistic regression, machine learning, phishing, random forests},
} 
@article{ieee2006_fu,
author = {Anthony Y. Fu and Liu Wenyin and Xiaotie Deng},
title = {Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)},
journal ={IEEE Transactions on Dependable and Secure Computing},
volume = {3},
number = {4},
issn = {1545-5971},
year = {2006},
pages = {301-311},
doi = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2006.50},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@inproceedings{www10_bohunsky,
 author = {Bohunsky, Paul and Gatterbauer, Wolfgang},
 title = {Visual Structure-based Web Page Clustering and Retrieval},
 booktitle = {Proceedings of the 19th International Conference on World Wide Web},
 series = {WWW '10},
 year = {2010},
 isbn = {978-1-60558-799-8},
 location = {Raleigh, North Carolina, USA},
 pages = {1067--1068},
 numpages = {2},
 url = {http://doi.acm.org/10.1145/1772690.1772807},
 doi = {10.1145/1772690.1772807},
 acmid = {1772807},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {similarity measures, web page clustering, web page representation, web page retrieval},
} 
@incollection{springer2013_jil,
year={2013},
isbn={978-3-642-38026-6},
booktitle={Grid and Pervasive Computing},
volume={7861},
series={Lecture Notes in Computer Science},
editor={Park, JamesJ.(JongHyuk) and Arabnia, HamidR. and Kim, Cheonshik and Shi, Weisong and Gil, Joon-Min},
doi={10.1007/978-3-642-38027-3_89},
title={Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System},
url={http://dx.doi.org/10.1007/978-3-642-38027-3_89},
publisher={Springer Berlin Heidelberg},
keywords={Phishing; Security; Cyber Attacks; Spam Trap},
author={Jeun, Inkyung and Lee, Youngsook and Won, Dongho},
pages={796-802}
}
@INPROCEEDINGS{cvpr2005_dalal, 
author={Dalal, N. and Triggs, B.}, 
booktitle={Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on}, 
title={Histograms of oriented gradients for human detection}, 
year={2005}, 
volume={1}, 
pages={886-893 vol. 1}, 
keywords={feature extraction;gradient methods;object detection;object recognition;support vector machines;coarse spatial binning;contrast normalization;edge based descriptors;fine orientation binning;fine-scale gradients;gradient based descriptors;histograms of oriented gradients;human detection;linear SVM;overlapping descriptor;pedestrian database;robust visual object recognition;High performance computing;Histograms;Humans;Image databases;Image edge detection;Object detection;Object recognition;Robustness;Support vector machines;Testing}, 
doi={10.1109/CVPR.2005.177}, 
ISSN={1063-6919}
}
@inproceedings{spie2012_jwhite,
   author = {{White}, J.~S. and {Matthews}, J.~N. and {Stacy}, J.~L.},
    title = "{A method for the automated detection phishing websites through both site characteristics and image analysis}",
booktitle = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
     year = 2012,
   series = {Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series},
   volume = 8408,
    month = may,
      eid = {84080B},
      doi = {10.1117/12.918956},
   adsurl = {http://adsabs.harvard.edu/abs/2012SPIE.8408E...9W},
  adsnote = {Provided by the SAO/NASA Astrophysics Data System}
}
@inproceedings{securecomm2007_rosiello, 
author={Rosiello, Angelo P E and Kirda, E. and Kruegel, C. and Ferrandi, F.}, 
booktitle={Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on}, 
title={A layout-similarity-based approach for detecting phishing pages}, 
year={2007}, 
pages={454-463}, 
keywords={Banking;Computer crime;Costs;Customer service;Electronic mail;Large-scale systems;Protection;Uniform resource locators;Web and internet services;Web pages}, 
doi={10.1109/SECCOM.2007.4550367}
}
@misc{cowley2012rapid,
  title={Rapid automatic keyword extraction for information retrieval and analysis},
  author={Cowley, W.E. and Cramer, N.O. and Crow, V.L. and Rose, S.J.},
  url={http://www.google.com/patents/US8131735},
  year={2012},
  month=mar # "~6",
  publisher={Google Patents},
  note={US Patent 8,131,735}
}
@article{sa11_shrivastava,
 author = {Shrivastava, Abhinav and Malisiewicz, Tomasz and Gupta, Abhinav and Efros, Alexei A.},
 title = {Data-driven Visual Similarity for Cross-domain Image Matching}, 
 journal = {ACM Transaction of Graphics (TOG) (Proceedings of ACM SIGGRAPH ASIA)},
 year = {2011},
 volume = {30},
 number = {6},
}
@INPROCEEDINGS{ieee2001_levina, 
author={Levina, E. and Bickel, P.}, 
booktitle={Computer Vision, 2001. ICCV 2001. Proceedings. Eighth IEEE International Conference on}, 
title={The Earth Mover's distance is the Mallows distance: some insights from statistics}, 
year={2001}, 
volume={2}, 
pages={251-256 vol.2}, 
keywords={image classification;image processing;probability;Earth Mover's distance;Mallows distance;color similarities;probability distributions;texture classification;Earth;Euclidean distance;Fluid flow measurement;Humans;Image retrieval;Image segmentation;Multidimensional systems;Physics;Probability distribution;Statistics}, 
doi={10.1109/ICCV.2001.937632}
}
@INPROCEEDINGS{iccv1998_rubner, 
author={Rubner, Y. and Tomasi, C. and Guibas, L.J.}, 
booktitle={Computer Vision, 1998. Sixth International Conference on}, 
title={A metric for distributions with applications to image databases}, 
year={1998}, 
pages={59-66}, 
keywords={image colour analysis;image texture;visual databases;color;distributions;easy-to-compute lower bounds;image databases;linear optimization;multi-dimensional scaling displays;partial matching;texture;transportation problem;Application software;Computer displays;Computer science;Frequency;Geoscience;Histograms;Image databases;Image retrieval;Navigation;Psychology}, 
doi={10.1109/ICCV.1998.710701}
}
@inproceedings{iccv11_malisiewicz,
  Author =	 {Tomasz Malisiewicz and Abhinav Gupta and Alexei A. Efros},
  Booktitle =	 {ICCV},
  Title =	 {Ensemble of Exemplar-SVMs for Object Detection and Beyond},
  Year =	 2011
}

@INPROCEEDINGS{iccv2009_pele,
author = {Ofir Pele and Michael Werman},
title = {Fast and Robust Earth Mover's Distances},
booktitle = {ICCV},
year = {2009}
}
@article{2011_libsvm,
 author = {Chang, Chih-Chung and Lin, Chih-Jen},
 title = {LIBSVM: A Library for Support Vector Machines},
 journal = {ACM Trans. Intell. Syst. Technol.},
 issue_date = {April 2011},
 volume = {2},
 number = {3},
 month = may,
 year = {2011},
 issn = {2157-6904},
 pages = {27:1--27:27},
 articleno = {27},
 numpages = {27},
 url = {http://doi.acm.org/10.1145/1961189.1961199},
 doi = {10.1145/1961189.1961199},
 acmid = {1961199},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {Classification LIBSVM optimization regression support vector machines SVM},
} 
@Misc{phantomjs,
author = {Ariya Hidayat},
title =    {{PhantomJS} library},
howpublished = {\url{http://phantomjs.org/}},
year = {2010--2014}
}

@article{Moore,
  author  = "Moore, T and Clayton, R",
  title   = "Examining the impact of Web site take-down on phishing",
  journal = "Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit",
  year    = "2007",
  pages   = "1-13"
} 
@TechReport{WLBWBSS11,
  author =       {Ge Wang and He Liu and Sebastian Becerra and Kai
                  Wang and Serge Belongie and Hovav Shacham and
                  Stefan Savage},
  title =        {Verilogo: Proactive Phishing Detection via Logo
                  Recognition},
  institution =  {UC San Diego},
  year =         2011,
  month =        aug,
  number =       {CS2011-0969}
}
@article{sift,
 author = {Lowe, David G.},
 title = {Distinctive Image Features from Scale-Invariant Keypoints},
 journal = {Int. J. Comput. Vision},
 issue_date = {November 2004},
 volume = {60},
 number = {2},
 month = nov,
 year = {2004},
 issn = {0920-5691},
 pages = {91--110},
 numpages = {20},
 url = {http://dx.doi.org/10.1023/B:VISI.0000029664.99615.94},
 doi = {10.1023/B:VISI.0000029664.99615.94},
 acmid = {996342},
 publisher = {Kluwer Academic Publishers},
 address = {Hingham, MA, USA},
 keywords = {image matching, invariant features, object recognition, scale invariance},
} 
@techreport{kaspersky,
    author    = "Kaspersky Lab",
    title     = "Financial cyber threats in 2013",
    institution = "Kaspersky Lab",
    year      = "2014",
    month     = apr
}
