Cite this paper
nullD. Miyamoto, H. Hazeyama and Y. Kadobayashi, "HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites," Journal of Intelligent Learning Systems and Applications
, Vol. 2 No. 4, 2010, pp. 190-199. doi: 10.4236/jilsa.2010.24022
 T. McCall and R. Moss, “Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Dam-age Consumer Trust in Online Commerce,” 2005. http://www.gartner.com/press_releases/asset_129754 _11. html
 C. Pettey and H. Stevens, “Gartner Says Number of Phishing Attacks on U.S. Consumers In-creased 40 Percent in 2008,” April 2009. http://www.gartner.com/it/ page.jsp?id=936913
 Anti-Phishing Working Group, “Phishing Activity Trends Report-Q1, 2008,” August 2008. http://www.apwg. com/reports/apwgreport_Q1_2008.pdf, 0
 Y. Zhang, S. Egelman, L. Cranor and J. Hong, “Phinding Phish: Evaluating Anti-Phishing Tools,” Proceedings of the 14th Annual Network and Distributed System Security Sympo-sium, USA, February 2007.
 D. Miyamoto, H. Ha-zeyama and Y. Kadobayashi, “An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites,” Australian Journal of Intelligent Information Processing Systems, Vol. 10, No. 2, 2008, pp. 54-63.
 I. Fette, N. Sadeh and A. Tomasic, “Learning to Detect Phishing Emails,” Proceedings of the 16th International Conference on World Wide Web, Canada, May 2007, pp. 649-656.
 S. Abu-Nimeh, D. Nappa, X. Wang and S. Nair, “A Comparison of Machine Learning Techniques for Phishing Detection,” Proceedings of the 2nd Annual Anti-Phishing Working Groups eCrime Researchers Summit, USA, October 2007, pp. 60-69.
 R. Basnet, S. Mukkamala and A. H. Sung, “Detection of Phishing Attacks: A Machine Learning Approach,” Studies in Fuzziness and Soft Computing, Vol. 226, February 2008, pp. 373-383.
 Y. Pan and X. Ding, “Anomaly Based Web Phishing Page Detection,” Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, USA, September 2006, pp. 381-392.
 Y. Zhang, J. Hong and L. Cranor, “CANTINA: A Content-Based Approach to Detect Phishing Web Sites,” Proceedings of the 16th World Wide Web Conference, China, May 2007, pp. 639-648.
 Open DNS, “Phishtank-Join the Fight against Phishing,” http://www.phishtank.com.
 Y. Freund and R. E. Schapire, “A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting,” Journal of Computer and System Science, Vol. 55, No. 1, August 1997, pp. 119-137.
 R. Dhamija, J. D. Tygar and M.A. Hearst, “Why Phishing Works,” Proceedings of Conference on Human Factors in Computing Systems, April 2006, pp. 581-590.
 A. Y. Fu, X. Deng, L. Wenyin and G. Little, “The Methodology and an Application to Fight against Unicode Attacks,” Proceedings of the 2nd Symposium on Usable Privacy and Security, USA, July 2006, pp. 91-101.
 T. A. Phelps and R. Wilensky, “Robust Hyperlinks: Cheap, Everywhere, Now,” Proceedings of the 8th International Conference on Digital Documents and Electronic Publishing, September 2000, pp. 28-43.