Cite this paper
D. Miyamoto, H. Hazeyama, Y. Kadobayashi and T. Takahashi, "Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications
, Vol. 4 No. 4, 2012, pp. 319-329. doi: 10.4236/jilsa.2012.44033
 D. Miyamoto, H. Hazeyama and Y. Kadobayashi, “HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites,” Journal of Intelligent Learning Systems and Applications, Vol. 2, No. 4, 2010, pp.190-199. doi:10.4236/jilsa.2010.24022
 Y. Freund and R. E. Schapire, “A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting,” Journal of Computer and System Science, Vol. 55, No. 1, 1997, pp. 119-139.
 S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong and C. Zhang, “An Empirical Analysis of Phishing Blacklists,” 2009.
 Y. Zhang, J. Hong and L. Cranor, “CANTINA: A Content-Based Approach to Detect Phishing Web Sites,” Proceedings of the 16th World Wide Web Conference, Banff, 8-12 May 2007, pp. 649-656.
 D. Miyamoto, H. Hazeyama and Y. Kadobayashi, “An Evaluation of Machine Learning-based Methods for Detection of Phishing Sites,” Australian Journal of Intelligent Information Processing Systems, Vol. 10, No. 2, 2008, pp. 54-63.
 OpenDNS, “PhishTank—Join the Fight against Phishing.”
 M. Wu, R. C. Miller and S. L. Garnkel, “Do SecurityToolbars Actually Prevent Phishing Attacks?” Proceedings of Conference on Human Factors in Computing Systems, New York, 22-27 April 2006.
 P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. I. Hong and E. Nunge, “Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System,” Proceedings of Conference on Human Factors in Computing Systems, San Jose, 27 April-3 May 2007, pp. 905-914.
 R. Dhamija, J. D. Tygar and M. A. Hearst, “Why Phishing Works,” Proceedings of Conference on Human Factors in Computing Systems, New York, 22-27 April 2006, pp. 581-590.
 B. J. Fogg, L. Marable, J. Stanford and E. R. Tauber, “How Do People Evaluate a Web Site’s Credibility? Results from a Large Study,” Technical Report, Stanford, 2002.
 R. Biddle, P. C. van Oorschot, A. S. Patrick, J. Sobey and T. Whalen, “Browser Interfaces and Extended Validation ssl Certificates: An Empirical Study,” Proceedings of the 2009 ACM Workshop on Cloud Computing Security, New York, 9-13 November 2009, pp. 19-30.
 A. P. Dempster, N. Laird and D. Rubin, “Maximum Likelihood from Incomplete Data via the EM Algorithm,” Journal of the Royal Statistical Society Series, Vol. 39, No. 1, 1977, pp. 1-38.
 G. E. Schwarz, “Estimating the Dimension of a Model,” Annals of Statistics, Vol. 6, No. 2, 1978, pp. 461-464. doi:10.1214/aos/1176344136