SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Feature selection for phishing detection: a review of research
Web services motivate phishers to evolve more deceptive websites as their never-ending
threats to users. This intricate challenge enforces researchers to develop more proficient …
threats to users. This intricate challenge enforces researchers to develop more proficient …
A phish detector using lightweight search features
G Varshney, M Misra, PK Atrey - Computers & Security, 2016 - Elsevier
Web phishing is a well-known cyber-attack which is used by attackers to obtain vital
information such as username, password, credit card number, social security number, and/or …
information such as username, password, credit card number, social security number, and/or …
Leverage website favicon to detect phishing websites
Phishing attack is a cybercrime that can lead to severe financial losses for Internet users and
entrepreneurs. Typically, phishers are fond of using fuzzy techniques during the creation of a …
entrepreneurs. Typically, phishers are fond of using fuzzy techniques during the creation of a …
Application of ensemble Machine Learning models for phishing detection on web networks
Phishing is a technique of fraud and identity stealing that includes convincing Website
visitors to provide confidential info and details such as their user id, secret key, payment info …
visitors to provide confidential info and details such as their user id, secret key, payment info …
Prioritized active learning for malicious url detection using weighted text-based features
SD Bhattacharjee, A Talukder… - … on Intelligence and …, 2017 - ieeexplore.ieee.org
Data analytics is being increasingly used in cyber-security problems, and found to be useful
in cases where data volumes and heterogeneity make it cumbersome for manual …
in cases where data volumes and heterogeneity make it cumbersome for manual …
Frequent rule reduction for phishing URL classification using fuzzy deep neural network model
MS Kumar, B Indrani - Iran Journal of Computer Science, 2021 - Springer
Phishing is an online extensive fraud, which can trick Internet clients into uncovering their
mystery data and qualifications, eg, login id, secret key, charge card number, and so on …
mystery data and qualifications, eg, login id, secret key, charge card number, and so on …
Detection of phishing websites using machine learning
GK Kamalam, P Suresh, R Nivash… - 2022 International …, 2022 - ieeexplore.ieee.org
Criminals seeking sensitive information construct illegal clones of actual websites and e-
mail accounts. The e-mail will be made up of real firm logos and slogans. When a user clicks …
mail accounts. The e-mail will be made up of real firm logos and slogans. When a user clicks …
[PDF][PDF] New hybrid features for phish website prediction
Phishing is a serious threat to the web economy and the Internet communication, because
phishers put both users and organizations at risk of identity theft and financial losses …
phishers put both users and organizations at risk of identity theft and financial losses …
[PDF][PDF] SELECTION OF ROBUST FEATURE SUBSETS FOR PHISH WEBPAGE PREDICTION USING MAXIMUM RELEVANCE AND MINIMUM REDUNDANCY …
Phishers usually evolve their web exploits to defeat current anti-phishing community.
Accordingly, that becomes a serious web threat and puts both users and enterprises at the …
Accordingly, that becomes a serious web threat and puts both users and enterprises at the …