Phishing attacks continue to be a significant threat on the Internet. Prior studies show that it is possible to determine whether a website is phishing or not just by analyzing its URL more …
D Hasselquist, EK Gawell, A Karlström… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
The prevalence of phishing domains is steadily rising as attackers exploit toolkits to create phishing websites. As web development expertise is no longer a prerequisite, phishing …
B Wardman, G Shukla, G Warner - 2009 eCrime Researchers …, 2009 - ieeexplore.ieee.org
It has been shown that most phishing sites are created by means of a vulnerable Web server being re-purposed by a phisher to host a counterfeit Website without the knowledge of the …
Phishing attack, in which a user is tricked into revealing sensitive information on a spoofed website, is one of the most common threat to cybersecurity. Most modern web browsers …
G Liu, B Qiu, L Wenyin - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
An approach to identification of the phishing target of a given (suspicious) webpage is proposed by clustering the webpage set consisting of its all associated webpages and the …
JH Huh, H Kim - Foundations and Practice of Security: 4th Canada …, 2012 - Springer
We propose a new phishing detection heuristic based on the search results returned from popular web search engines such as Google, Bing and Yahoo. The full URL of a website a …
S Garera, N Provos, M Chew, AD Rubin - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers …
G Varshney, M Misra, PK Atrey - Security and Communication …, 2016 - Wiley Online Library
Phishing is a fraudulent technique that is used over the Internet to deceive users with the goal of extracting their personal information such as username, passwords, credit card, and …
L Wenyin, G Huang, L Xiaoyue, Z Min… - Special interest tracks and …, 2005 - dl.acm.org
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate …