YS Chen, YH Yu, HS Liu… - Proceedings of the 2014 …, 2014 - ieeexplore.ieee.org
Phishing is a form of cybercrime used to lure a victim to reveal his/her sensitive personal information to fraudulent web pages. To protect users from phishing attacks, many anti …
S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This …
ME Maurer, L Höfer - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks, classical blacklist based approaches are not sufficient to protect online users. While …
S Marchal, J François, R State… - … conference on network …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This …
J Feng, Y Qiao, O Ye, Y Zhang - PeerJ Computer Science, 2022 - peerj.com
Phishing webpages are often generated by phishing kits or evolved from existing kits. Therefore, the homology analysis of phishing webpages can help curb the proliferation of …
LD Nguyen, DN Le, LT Vinh - Proceedings of the 5th Symposium on …, 2014 - dl.acm.org
Most modern day phishing attacks occur by luring users into visiting a malicious web page that looks and behaves like the original. Phishing is a web-based attack which end users are …
WF Zhang, YM Zhou, L Xu, BW Xu - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
It is the key problem for detecting the phishing pages how to quickly and efficiently to calculate the similarity of web pages. There is still a large space to improve the detecting …
Over the years, various technical means have been developed to protect Internet users from phishing attacks. To enrich the anti-phishing efforts, we capitalise on concepts from graph …
S Afroz, R Greenstadt - Proc. 5th IEEE Int. Conf. Semantic Comput …, 2009 - cs.drexel.edu
Phishing is a web-based attack that uses social engineering techniques to exploit Internet users and acquire sensitive data. Most phishing attacks work by creating a fake version of …