A big data architecture for security data and its application to phishing characterization

PHB Las-Casas, VS Dias, W Meira… - 2016 IEEE 2nd …, 2016 - ieeexplore.ieee.org
As the Internet grows, cybersecurity problems also arise. Different types of malicious
activities have been explored by attackers. However, the existent defense mechanisms are …

EyeBit: eye-tracking approach for enforcing phishing prevention habits

D Miyamoto, T Iimura, G Blanc, H Tazaki… - … on Building Analysis …, 2014 - ieeexplore.ieee.org
This paper proposes a cognitive method with the goal to get end users into the habit of
checking the address bar of the web browser. Earlier surveys of end user behavior …

On Feature selection for the prediction of phishing websites

W Fadheel, M Abusharkh… - … 3rd Intl Conf on Big Data …, 2017 - ieeexplore.ieee.org
with the rise of the big data paradigm, large data sets are being made available for
knowledge mining. While this open up possibilities for new insights being gained every day …

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs

W Chu, BB Zhu, F Xue, X Guan… - 2013 IEEE international …, 2013 - ieeexplore.ieee.org
Phishing is the third cyber-security threat globally and the first cyber-security threat in China.
There were 61.69 million phishing victims in China alone from June 2011 to June 2012, with …

A literature review on phishing crime, prevention review and investigation of gaps

AN Shaikh, AM Shabut… - 2016 10th international …, 2016 - ieeexplore.ieee.org
Phishing is a rapidly growing threat in cyber world and causing billions of dollars in damage
every year to internet users. It is an unlawful activity which uses a group of social …

CyberPhishing: a game-based platform for phishing awareness testing

ML Hale, RF Gamble, P Gamble - 2015 48th Hawaii …, 2015 - ieeexplore.ieee.org
Phishing attacks sap billions of dollars annually from unsuspecting individuals while
compromising individual privacy. Companies and privacy advocates seek ways to better …

Email embeddings for phishing detection

LF Gutiérrez, F Abri, M Armstrong… - … conference on big …, 2020 - ieeexplore.ieee.org
The problem of detecting phishing emails through machine learning techniques has been
discussed extensively in the literature. Conventional and state-of-the-art machine learning …

Using domain top-page similarity feature in machine learning-based web phishing detection

N Sanglerdsinlapachai… - 2010 Third International …, 2010 - ieeexplore.ieee.org
This paper presents a study on using a concept feature to detect web phishing problem.
Following the features introduced in Carnegie Mellon Anti-phishing and Network Analysis …

Phishing email detection technique by using hybrid features

LM Form, KL Chiew, WK Tiong - 2015 9th International …, 2015 - ieeexplore.ieee.org
Phishing emails is growing at an alarming rate in this few years. It has caused tremendous
financial losses to internet users. Phishing techniques getting more advance everyday and …

Societal aspects of phishing

JW Ragucci, SA Robila - 2006 IEEE International Symposium …, 2006 - ieeexplore.ieee.org
The damage caused by phishing does not only apply to monetary property alone. The fragile
bonds of trust that organizations build with their constituents are shattered in the process. As …