An integrated approach to detect phishing mail attacks: a case study

R Suriya, K Saravanan, A Thangavelu - Proceedings of the 2nd …, 2009 - dl.acm.org
Phishing is a process of luring unsuspecting Internet users to a fake website by using
authentic looking email and messages for fraudulent purposes. Most preferred way that the …

URL-based phishing detection using the entropy of non-alphanumeric characters

ES Aung, H Yamana - Proceedings of the 21st International Conference …, 2019 - dl.acm.org
Phishing is a type of personal information theft in which phishers lure users to steal sensitive
information. Phishing detection mechanisms using various techniques have been …

[PDF][PDF] Automated phishing website detection using URL features and machine learning technique

V Preethi, G Velmayil - International Journal of Engineering and …, 2016 - academia.edu
In spite of the development of aversion strategies, phishing remains an essential risk even
after the primary countermeasures and in view of receptive URL blacklisting. This strategy is …

A Study of Anti-Phising Methodologies and Phishing Detection Algorithms

BM Cerda, S Yuan - Proceedings of the International …, 2019 - search.proquest.com
Phishing is a way for attackers to convince users to believe the information provided is
legitimate and thus voluntarily hand over personal or sensitive information. In many of the …

Jail-Phish: An improved search engine based phishing detection system

RS Rao, AR Pais - Computers & Security, 2019 - Elsevier
Stealing of sensitive information (username, password, credit card information and social
security number, etc.) using a fake webpage that imitates trusted website is termed as …

Stop Phishing: Master Anti-Phishing Techniques

S Merugula, KS Kumar, S Muppidi… - 2022 IEEE North …, 2022 - ieeexplore.ieee.org
Phishing Websites steal confidential material like from digital users. They steal all
information possible from an end user. They use different techniques to steal the data. Most …

[引用][C] Phishing attacks discovery based on html layout similarity

XQ Zou, P Zhang, CY Huang, ZP Chen, Y Sun, QY Liu - Journal on Communications, 2016

Phishing Website Detection as a Website Comparing Problem

MK Le-Nguyen, TCH Nguyen, DT Le, VH Nguyen… - SN Computer …, 2022 - Springer
Phishing attacks are severe threats to websites; therefore, phishing intelligence is crucial for
web owners to prevent potential phishing campaigns. Intuitively, phishing websites must …

Identify fixed-path phishing attack by STC

CH Hsu, P Wang, S Pu - Proceedings of the 8th Annual Collaboration …, 2011 - dl.acm.org
Phishing websites gain billions of dollars of profits from stealing personal identities and
private data. In this paper, an URL classification method is proposed to prioritize suspicious …

[PDF][PDF] Phishing detection using RDF and random forests.

V Muppavarapu, A Rajendran, SK Vasudevan - Int. Arab J. Inf. Technol., 2018 - ccis2k.org
Phishing is one of the major threats in this internet era. Phishing is a smart process where a
legitimate website is cloned and victims are lured to the fake website to provide their …