PhishScore: Hacking phishers' minds

S Marchal, J François, R State… - … conference on network …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

PhishStorm: Detecting phishing with streaming analytics

S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the
principal countermeasures in use are still based on reactive URL blacklisting. This …

Everything is in the name–a URL based approach for phishing detection

H Tupsamudre, AK Singh, S Lodha - International symposium on cyber …, 2019 - Springer
Phishing attack, in which a user is tricked into revealing sensitive information on a spoofed
website, is one of the most common threat to cybersecurity. Most modern web browsers …

Phishing sites detection based on Url Correlation

Y Xue, Y Li, Y Yao, X Zhao, J Liu… - 2016 4th International …, 2016 - ieeexplore.ieee.org
With the rapid development of the information technology, internet security has drawn more
and more attention. Nowadays, most researchers focus on lexical and host features to …

Influence of URL Formatting on Users' Phishing URL Detection

M Mossano, O Kulyk, BM Berens, EM Häußler… - Proceedings of the …, 2023 - dl.acm.org
Despite technical advances in anti-phishing protection, in many cases the detection of
phishing URLs largely depends on users manually inspecting the links found in suspicious …

PhishTransformer: A Novel Approach to Detect Phishing Attacks Using URL Collection and Transformer

S Asiri, Y Xiao, T Li - Electronics, 2023 - mdpi.com
Phishing attacks are a major threat to online security, resulting in millions of dollars in
losses. These attacks constantly evolve, forcing the cyber security community to improve …

Catching classical and hijack-based phishing attacks

T Thakur, R Verma - International Conference on Information Systems …, 2014 - Springer
The social engineering strategy, used by cyber criminals, to get confidential information from
Internet users is called phishing. It continues to trick Internet users into losing time and …

Mining web to detect phishing URLs

RB Basnet, AH Sung - 2012 11th International Conference on …, 2012 - ieeexplore.ieee.org
Proliferation of phishing attacks in recent years has presented an important cyber security
research area. Over the years, there has been an increase in the technology, diversity, and …

Phishdef: Url names say it all

A Le, A Markopoulou… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Phishing is an increasingly sophisticated method to steal personal user information using
sites that pretend to be legitimate. In this paper, we take the following steps to identify …

Sophisticated phishers make more spelling mistakes: using URL similarity against phishing

ME Maurer, L Höfer - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks,
classical blacklist based approaches are not sufficient to protect online users. While …