[1] Wikipedia. Phishing[EB/OL].(2013-04-20)[2013-04-27]. http://en.wikipedia.org/wiki/Phishing.
[2] Anti-Phishing Working Group. Phishing activity trends report [EB/OL].(2012-10-17)[2013-03-16]. http://docs.apwg.org/reports/apwg_trends_report_q2_2012.pdf.
[3] Chandrasekaran M, Narayanan K, Upadhyaya S. Phishing email detection based on structural properties[C]//NYS Cyber Security Conference. New York, USA, 2006: 2-8.
[4] Zhang Y, Hong J I, Cranor L F. Cantina: a content-based approach to detecting phishing web sites[C]//16th International World Wide Web Conference. Banff, Alberta, Canada, 2007:639-648.
[5] Fu A Y, Liu W Y, Deng X T. Detecting phishing web pages with visual similarity assessment based on earth mover’s distance(EMD)[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 301-311.
[6] Cao Jiuxin, Mao Bo, Luo Junzhou, et al. A phishing web pages detection algorithm based on nested structure of earth mover’s distance(nested-EMD)[J]. Chinese Journal of Computers, 2009, 32(5): 922-929.(in Chinese)
[7] Garera S, Provos N, Chew M, et al. A framework for detection and measurement of phishing attacks[C]//Proceedings of the 2007 ACM Workshop on Recurring Malcode. Alexandria, VA, USA, 2007: 1-8.
[8] Smith T F, Waterman M S. Identification of common molecular subsequences [J]. Journal of Molecular Biology, 1981, 147(1): 195-197.
[9] Chang C C, Lin C J. LIBSVM: a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(3): 1-27.
[10] Domeniconi C, Gunopulos D. Incremental support vector machine construction[C]//Proceedings of IEEE International Conference on Data Mining. San Jose, CA, USA, 2001: 589-592.
[11] Syed N A, Liu H, Sung K K. Incremental learning with support vector machines[C]//Proceedings of the Workshop on Support Vector Machines at the International Joint Conference on Artificial Intelligence. Stockholm, Sweden, 1999: 876-892.
[12] Wang W J. A redundant incremental learning algorithm for SVM[C]//Proceedings of the 7th International Conference on Machine Learning and Cybernetics. Kunming, China, 2008: 734-738.