SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Systematization of knowledge (sok): A systematic review of software-based web phishing detection
Phishing is a form of cyber attack that leverages social engineering approaches and other
sophisticated techniques to harvest personal information from users of websites. The …
sophisticated techniques to harvest personal information from users of websites. The …
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia - Neural Networks, 2020 - Elsevier
Increasing phishing sites today have posed great threats due to their terribly imperceptible
hazard. They expect users to mistake them as legitimate ones so as to steal user information …
hazard. They expect users to mistake them as legitimate ones so as to steal user information …
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets
Phishing websites belong to a social engineering attack where perpetrators fake legitimate
websites to lure people to access so as to illegally acquire user's identity, password, privacy …
websites to lure people to access so as to illegally acquire user's identity, password, privacy …
Know your phish: Novel techniques for detecting phishing sites and their targets
Phishing is a major problem on the Web. Despite the significant attention it has received
over the years, there has been no definitive solution. While the state-of-the-art solutions …
over the years, there has been no definitive solution. While the state-of-the-art solutions …
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
This paper proposes a phishing detection technique based on the difference between the
target and actual identities of a webpage. The proposed phishing detection approach, called …
target and actual identities of a webpage. The proposed phishing detection approach, called …
Tracking phishing attacks over time
The so-called``phishing''attacks are one of the important threats to individuals and
corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the …
corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the …
An efficacious method for detecting phishing webpages through target domain identification
Phishing is a fraudulent act to acquire sensitive information from unsuspecting users by
masking as a trustworthy entity in an electronic commerce. Several mechanisms such as …
masking as a trustworthy entity in an electronic commerce. Several mechanisms such as …
Off-the-hook: An efficient and usable client-side phishing prevention application
S Marchal, G Armano, T Gröndahl… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Phishing is a major problem on the Web. Despite the significant attention it has received
over the years, there has been no definitive solution. While the state-of-the-art solutions …
over the years, there has been no definitive solution. While the state-of-the-art solutions …
Deltaphish: Detecting phishing webpages in compromised websites
The large-scale deployment of modern phishing attacks relies on the automatic exploitation
of vulnerable websites in the wild, to maximize profit while hindering attack traceability …
of vulnerable websites in the wild, to maximize profit while hindering attack traceability …