V Shahrivari, MM Darabi, M Izadi - arXiv preprint arXiv:2009.11116, 2020 - arxiv.org
The Internet has become an indispensable part of our life, However, It also has provided opportunities to anonymously perform malicious activities like Phishing. Phishers try to …
A Alswailem, B Alabdullah, N Alrumayh… - … & Information Security …, 2019 - ieeexplore.ieee.org
Phishing website is one of the internet security problems that target the human vulnerabilities rather than software vulnerabilities. It can be described as the process of …
L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can be said that a secure network environment is a basis for the rapid and sound development of …
A Aljofey, Q Jiang, A Rasool, H Chen, W Liu, Q Qu… - Scientific Reports, 2022 - nature.com
Today's growing phishing websites pose significant threats due to their extremely undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …
AK Jain, BB Gupta - Telecommunication Systems, 2018 - Springer
The existing anti-phishing approaches use the blacklist methods or features based machine learning techniques. Blacklist methods fail to detect new phishing attacks and produce high …
M Sánchez-Paniagua, E Fidalgo, E Alegre… - Expert Systems with …, 2022 - Elsevier
Phishing attacks are one of the most challenging social engineering cyberattacks due to the large amount of entities involved in online transactions and services. In these attacks …
The phishing website has evolved as a major cybersecurity threat in recent times. The phishing websites host spam, malware, ransomware, drive-by exploits, etc. A phishing …
Phishing is a web-based criminal act. Phishing sites lure sensitive information from naive online users by camouflaging themselves as trustworthy entities. Phishing is considered an …
The rapid development of e-commerce, e-banking, and social networks has made phishing attack detection one of the most critical technologies in all cyber security systems. To …