[HTML][HTML] A systematic literature review on phishing website detection techniques
A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain
sensitive information from an internet user. In this Systematic Literature Survey (SLR) …
sensitive information from an internet user. In this Systematic Literature Survey (SLR) …
A survey of machine learning-based solutions for phishing website detection
L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can
be said that a secure network environment is a basis for the rapid and sound development of …
be said that a secure network environment is a basis for the rapid and sound development of …
Feature selection using fuzzy neighborhood entropy-based uncertainty measures for fuzzy neighborhood multigranulation rough sets
L Sun, L Wang, W Ding, Y Qian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
For heterogeneous data sets containing numerical and symbolic feature values, feature
selection based on fuzzy neighborhood multigranulation rough sets (FNMRS) is a very …
selection based on fuzzy neighborhood multigranulation rough sets (FNMRS) is a very …
Ai meta-learners and extra-trees algorithm for the detection of phishing websites
Phishing is a type of social web-engineering attack in cyberspace where criminals steal
valuable data or information from insensitive or uninformed users of the internet. Existing …
valuable data or information from insensitive or uninformed users of the internet. Existing …
Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model
N Ding, HX Ma, H Gao, YH Ma, GZ Tan - Computers & Electrical …, 2019 - Elsevier
Anomaly detection is a long-standing problem in system designation. High-quality anomaly
detection can benefit plenty of applications (eg system monitoring, disaster precaution and …
detection can benefit plenty of applications (eg system monitoring, disaster precaution and …
DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features
E Zhu, Y Ju, Z Chen, F Liu, X Fang - Applied Soft Computing, 2020 - Elsevier
Recently, phishing emerges as one of the biggest threats to human's daily networking
environments. Phishing attackers disguise illegal URLs as normal ones to steal user's …
environments. Phishing attackers disguise illegal URLs as normal ones to steal user's …
Phishing website classification and detection using machine learning
The phishing website has evolved as a major cybersecurity threat in recent times. The
phishing websites host spam, malware, ransomware, drive-by exploits, etc. A phishing …
phishing websites host spam, malware, ransomware, drive-by exploits, etc. A phishing …
Phishing detection based on machine learning and feature selection methods
M Almseidin, AMA Zuraiq, M Al-Kasassbeh, N Alnidami - 2019 - learntechlib.org
With increasing technology developments, the Internet has become everywhere and
accessible by everyone. There are a considerable number of web-pages with different …
accessible by everyone. There are a considerable number of web-pages with different …
Detecting Phishing Sites--An Overview
P Kalaharsha, BM Mehtre - arXiv preprint arXiv:2103.12739, 2021 - arxiv.org
Phishing is one of the most severe cyber-attacks where researchers are interested to find a
solution. In phishing, attackers lure end-users and steal their personal in-formation. To …
solution. In phishing, attackers lure end-users and steal their personal in-formation. To …
Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations
The damaging effect of phishing is traumatizing as attackers or hackers execute theft of
sensitive information from users subtly for inappropriate or unauthorized usage. In the light …
sensitive information from users subtly for inappropriate or unauthorized usage. In the light …