Spear phishing emails detection based on machine learning

X Ding, B Liu, Z Jiang, Q Wang… - 2021 IEEE 24th …, 2021 - ieeexplore.ieee.org
Spear phishing emails target to specific individual or organization, they are more elaborated,
targeted, and harmful than phishing emails. The attackers usually harvest information about …

A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework

S Patil, S Dhage - 2019 5th International Conference on …, 2019 - ieeexplore.ieee.org
Phishing is a security attack to acquire personal information like passwords, credit card
details or other account details of a user by means of websites or emails. Phishing websites …

Phishing website detection framework through web scraping and data mining

AJ Park, RN Quadari, HH Tsang - 2017 8th IEEE Annual …, 2017 - ieeexplore.ieee.org
Phishers often exploit users' trust on the appearance of a site by using webpages that are
visually similar to an authentic site. In the past, various research studies have tried to identify …

Classifying phishing URLs using recurrent neural networks

AC Bahnsen, EC Bohorquez, S Villegas… - … on electronic crime …, 2017 - ieeexplore.ieee.org
As the technical skills and costs associated with the deployment of phishing attacks
decrease, we are witnessing an unprecedented level of scams that push the need for better …

DC scanner: Detecting phishing attack

B Kumar, P Kumar, A Mundra… - 2015 Third International …, 2015 - ieeexplore.ieee.org
Data mining has been used as a technology in various applications of engineering, sciences
and others to analysis data of systems and to solve problems. Its applications further extend …

Anomaly based web phishing page detection

Y Pan, X Ding - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Many anti-phishing schemes have recently been proposed in literature. Despite all those
efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that …

Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks

CM McRae, RB Vaughn - 2007 40th Annual Hawaii …, 2007 - ieeexplore.ieee.org
This paper presents a summary of research findings for a new reacitve phishing
investigative technique using Web bugs and honeytokens. Phishing has become a rampant …

How could I fall for that? Exploring phishing victimization with the heuristic-systematic model

W Zhang, X Luo, SD Burd… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
To the extent that phishing has become a serious threat to information security, there has
been rather limited theory-grounded research on this burgeoning phenomenon. In this …

A hybrid model to detect phishing-sites using supervised learning algorithms

MAUH Tahir, S Asghar, A Zafar… - 2016 International …, 2016 - ieeexplore.ieee.org
Since last decades, online technologies have revolutionized the modern computing world.
However, as a result, security threats are increasing rapidly. A huge community is using the …

Visual-similarity-based phishing detection

E Medvet, E Kirda, C Kruegel - … of the 4th international conference on …, 2008 - dl.acm.org
Phishing is a form of online fraud that aims to steal a user's sensitive information, such as
online banking passwords or credit card numbers. The victim is tricked into entering such …