[1] |
YAN Yuwei. Overview of QR Code Technology and Its Application[J]. Intelligent Computer and Applications, 2019,9(5):94-97.
|
|
燕雨薇. 二维码技术及其应用综述[J]. 智能计算机与应用, 2019,9(5):94-97.
|
[2] |
GARERA S, PROVOS N, CHEW M, et al. A Framework for Detection and Measurement of Phishing Attacks[C]// ACM. 14th ACM Conference on Computer and Communications Security 2007, November 2, 2007,Alexandria Virginia, USA. New York: ACM, 2007: 1-8.
|
[3] |
MA J, SAUL L K, SAVAGE S, et al. Learning to Detect Malicious URLs[J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3):1-30.
|
[4] |
WANG Yuqi, LIU Bowen, LIN Guoyuan. Phishing Detection Algorithm Based on Language Features of URL[J]. Computer Engineering and Applications, 2019,55(24):84-90.
|
|
王雨琪, 刘博文, 林果园. 基于URL语言特征的钓鱼网站检测算法[J]. 计算机工程与应用, 2019,55(24):84-90.
|
[5] |
PANG Shuang. Phishing Defense Research for QR Code[D]. Changsha: Central South University of Forestry and Technology, 2016.
|
|
庞爽. 面向QR码的网络钓鱼防御研究[D]. 长沙:中南林业科技大学, 2016.
|
[6] |
VIDAS T, OWUSU E, WANG Shuai, et al. Qrishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks[M]// Springer. Financial Cryptography and Data Security. Heidelberg: Springer, Belin, Heidelberg, 2013: 52-69.
|
[7] |
CHAI Yanna. Research of Anti-phishing for QR Code[J]. Computer Technology and Development, 2020(4):100-104.
|
|
柴艳娜. QR二维码防钓鱼的研究[J]. 计算机技术与发展, 2020(4) 100-104.
|
[8] |
ZOU Xueqiang, ZHANG Peng, HUANG Caiyun, et al. Phishing Attacks Discovery Based on HTML Layout Similarity[J]. Journal on Communications, 2016,37(Z1):116-124.
|
|
邹学强, 张鹏, 黄彩云, 等. 基于页面布局相似性的钓鱼网页发现方法[J]. 通信学报, 2016,37(Z1):116-124.
|