S Marchal, J François, R State… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This …
YS Chen, YH Yu, HS Liu… - Proceedings of the 2014 …, 2014 - ieeexplore.ieee.org
Phishing is a form of cybercrime used to lure a victim to reveal his/her sensitive personal information to fraudulent web pages. To protect users from phishing attacks, many anti …
ME Maurer, L Höfer - Cyberspace Safety and Security: 4th International …, 2012 - Springer
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks, classical blacklist based approaches are not sufficient to protect online users. While …
S Marchal, J François, R State… - … conference on network …, 2014 - ieeexplore.ieee.org
Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This …
J Feng, Y Qiao, O Ye, Y Zhang - PeerJ Computer Science, 2022 - peerj.com
Phishing webpages are often generated by phishing kits or evolved from existing kits. Therefore, the homology analysis of phishing webpages can help curb the proliferation of …
LD Nguyen, DN Le, LT Vinh - Proceedings of the 5th Symposium on …, 2014 - dl.acm.org
Most modern day phishing attacks occur by luring users into visiting a malicious web page that looks and behaves like the original. Phishing is a web-based attack which end users are …
Over the years, various technical means have been developed to protect Internet users from phishing attacks. To enrich the anti-phishing efforts, we capitalise on concepts from graph …
WF Zhang, YM Zhou, L Xu, BW Xu - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
It is the key problem for detecting the phishing pages how to quickly and efficiently to calculate the similarity of web pages. There is still a large space to improve the detecting …
C Opara, Y Chen, B Wei - Expert Systems with Applications, 2024 - Elsevier
Phishing websites distribute unsolicited content and are frequently used to commit email and internet fraud. Detecting them before any user information is submitted is critical …