Email phishing detection and prevention by using data mining techniques

Ş Şentürk, E Yerli, İ Soğukpınar - … International Conference on …, 2017 - ieeexplore.ieee.org
Social engineering has emerged as a serious threat in virtual communities and is an
important means to attack information systems. The services used by today's knowledge …

Phishing attacks detection a machine learning-based approach

F Salahdine, Z El Mrabet… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Phishing attacks are one of the most common social engineering attacks targeting users'
emails to fraudulently steal confidential and sensitive information. They can be used as a …

Countering phishing from brands' vantage point

V Bulakh, M Gupta - Proceedings of the 2016 ACM on International …, 2016 - dl.acm.org
Most anti-phishing solutions that exist today require scanning a large portion of the web,
which is vast and equivalent to finding a needle in a haystack. In addition, such solutions are …

Comparative analysis of features based machine learning approaches for phishing detection

AK Jain, BB Gupta - 2016 3rd international conference on …, 2016 - ieeexplore.ieee.org
Machine learning based anti-phishing techniques are based on various features extracted
from different sources. These features differentiate a phishing website from a legitimate one …

Phishing detection method based on borderline-smote deep belief network

J Zhang, X Li - Security, Privacy, and Anonymity in Computation …, 2017 - Springer
With the rapid development of Internet, phishing and other frauds are becoming more and
more serious. Criminals posing as banks, electricity providers, social networking sites to …

Phishing-the threat that still exists

K Nirmal, B Janet, R Kumar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Phishing is an online security attack in which the hacker aims in harvesting sensitive
information like passwords, credit card information etc. from the users by making them to …

Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach

R Liu, Y Lin, X Yang, SH Ng, DM Divakaran… - 31st USENIX Security …, 2022 - usenix.org
Explainable phishing detection approaches are usually based on references, ie, they
compare a suspicious webpage against a reference list of commonly targeted legitimate …

A layout-similarity-based approach for detecting phishing pages

APE Rosiello, E Kirda, F Ferrandi - 2007 third international …, 2007 - ieeexplore.ieee.org
Phishing is a current social engineering attack that results in online identity theft. In a
phishing attack, the attacker persuades the victim to reveal confidential information by using …

RRPhish: Anti-phishing via mining brand resources request

GG Geng, ZW Yan, Y Zeng… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Although in recent years a variety of anti-phishing studies have been carried out, phishing
fraud has become increasingly rampant. Especially with the popularity of electronic banking …

A Deep learning-based innovative technique for phishing detection in modern security with uniform resource locators

EA Aldakheel, M Zakariah, GA Gashgari, FA Almarshad… - Sensors, 2023 - mdpi.com
Organizations and individuals worldwide are becoming increasingly vulnerable to
cyberattacks as phishing continues to grow and the number of phishing websites grows. As …