U Ozker, OK Sahingoz - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
In recent years due to the inevitable growth of Internet technologies, almost all the real-world systems are transferred to digital platforms. This increases the use of cyberspace in every …
D Zhang, Z Yan, H Jiang, T Kim - Information & Management, 2014 - Elsevier
We propose a novel classification model that consists of features of website URLs and content for automatically detecting Chinese phishing e-Business websites. The model …
Y Wei, Y Sekiya - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing is a kind of worldwide spread cybercrime that uses disguised websites to trick users into downloading malware or providing personally sensitive information to attackers …
In recent years, phishing attacks have become more intelligent and more challenging to detect using typical phishing methods. Moreover, attackers have leveraged some web …
MA Adebowale, KT Lwin… - 2019 13th International …, 2019 - ieeexplore.ieee.org
Phishers sometimes exploit users' trust of a known website's appearance by using a similar page that looks like the legitimate site. In recent times, researchers have tried to identify and …
The phishing website has evolved as a major cybersecurity threat in recent times. The phishing websites host spam, malware, ransomware, drive-by exploits, etc. A phishing …
ESM El-Alfy - The Computer Journal, 2017 - academic.oup.com
With the increasing rate and catastrophic consequences of phishing attacks, research on anti-phishing solutions has gained growing importance in information security. Security risks …
S Tanaka, T Matsunaka, A Yamada… - 2021 IEEE conference …, 2021 - ieeexplore.ieee.org
The number of phishing sites is increasing and becoming a problem. General phishing sites often have very short lives. Phishers are thought to construct phishing sites using tools such …
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li… - Procedia Computer …, 2018 - Elsevier
Phishing websites are typical starting points of online social engineering attacks, including many recent online scams. The attackers develop web pages mimicking legitimate websites …