The rapid development of e-commerce, e-banking, and social networks has made phishing attack detection one of the most critical technologies in all cyber security systems. To …
AK Jain, BB Gupta - Telecommunication Systems, 2018 - Springer
The existing anti-phishing approaches use the blacklist methods or features based machine learning techniques. Blacklist methods fail to detect new phishing attacks and produce high …
RS Rao, AR Pais - Neural Computing and applications, 2019 - Springer
Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive information such as username, password, social security number or credit card number etc …
AV Ramana, KL Rao, RS Rao - Social Network analysis and mining, 2021 - Springer
Phishing is a cyber-attack which generates a fake website that imitates a trusted website to steal the sensitive information such as username, password, and credit card information …
AA Ubing, SKB Jasmi, A Abdullah… - International Journal of …, 2019 - academia.edu
This research focuses on evaluating whether a website is legitimate or phishing. Our research contributes to improving the accuracy of phishing website detection. Hence, a …
Security attacks on legitimate websites to steal users' information, known as phishing attacks, have been increasing. This kind of attack does not just affect individuals' or …
TK Hua, A Macgregor - Authorea Preprints, 2022 - essopenarchive.org
An efficient phishing website detection plugin service was developed using machine learning technique based on the prevalent phishing threat while using existing web …
A Aljofey, Q Jiang, A Rasool, H Chen, W Liu, Q Qu… - Scientific Reports, 2022 - nature.com
Today's growing phishing websites pose significant threats due to their extremely undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve …