Detecting phishing emails using hybrid features

L Ma, B Ofoghi, P Watters… - 2009 Symposia and …, 2009 - ieeexplore.ieee.org
Phishing emails have been used widely in fraud of financial organizations and customers.
Phishing email detection has drawn a lot attention for many researchers and malicious …

Phoney: Mimicking user response to detect phishing attacks

M Chandrasekaran, R Chinchani… - … Symposium on a …, 2006 - ieeexplore.ieee.org
Phishing scams pose a serious threat to end-users and commercial institutions alike. Email
continues to be the favorite vehicle to perpetrate such scams mainly due to its widespread …

Knowing your enemies: Leveraging data analysis to expose phishing patterns against a major US financial institution

J Vargas, AC Bahnsen, S Villegas… - … APWG Symposium on …, 2016 - ieeexplore.ieee.org
Phishing attacks against financial institutions constitutes a major concern and forces them to
invest thousands of dollars annually in prevention, detection and takedown of these kinds of …

Phishing susceptibility: The good, the bad, and the ugly

A Abbasi, FM Zahedi, Y Chen - 2016 IEEE conference on …, 2016 - ieeexplore.ieee.org
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to
be a major factor. In this study we use cluster analysis coupled with an elaborate controlled …

Towards a multi-layered phishing detection

K Rendall, A Nisioti, A Mylonas - Sensors, 2020 - mdpi.com
Phishing is one of the most common threats that users face while browsing the web. In the
current threat landscape, a targeted phishing attack (ie, spear phishing) often constitutes the …

URL2Vec: URL modeling with character embeddings for fast and accurate phishing website detection

H Yuan, Z Yang, X Chen, Y Li… - 2018 IEEE Intl Conf on …, 2018 - ieeexplore.ieee.org
A deep learning-based approach to phishing detection is proposed. Specifically, websites'
URLs and the characters in these URLs are mapped to documents and words, respectively …

Phishing URL detection with oversampling based on text generative adversarial networks

A Anand, K Gorde, JRA Moniz, N Park… - … Conference on Big …, 2018 - ieeexplore.ieee.org
The problem of imbalanced classes arises frequently in binary classification tasks. If one
class outnumbers another, trained classifiers become heavily biased towards the majority …

Goldphish: Using images for content-based phishing analysis

M Dunlop, S Groat, D Shelly - 2010 Fifth international …, 2010 - ieeexplore.ieee.org
Phishing attacks continue to plague users as attackers develop new ways to fool users into
submitting personal information to fraudulent sites. Many schemes claim to protect against …

Automatic detection of phishing target from phishing webpage

G Liu, B Qiu, L Wenyin - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
An approach to identification of the phishing target of a given (suspicious) webpage is
proposed by clustering the webpage set consisting of its all associated webpages and the …

Phishing: Classification and countermeasures

JA Chaudhry, RG Rittenhouse - 2015 7th International …, 2015 - ieeexplore.ieee.org
In this paper we investigate the problem of phishing. Phishing is a hybrid problem in that it
involves both technical and social issues. In this paper, we also discuss the polymorphic …