SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

A review of human-and computer-facing url phishing features

K Althobaiti, G Rummani… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
When detecting phishing websites, both humans and computers rely on aspects of the
website (features) to aid in their decision making. In this work, we conduct a review of URL …

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

A Oest, Y Safei, A Doupé, GJ Ahn… - … on Electronic Crime …, 2018 - ieeexplore.ieee.org
Phishing attacks are becoming increasingly prevalent: 2016 saw more phishing attacks than
any previous year on record according to the Anti-Phishing Working Group. At the same …

An intelligent classification model for phishing email detection

A Yasin, A Abuhasan - arXiv preprint arXiv:1608.02196, 2016 - arxiv.org
Phishing attacks are one of the trending cyber attacks that apply socially engineered
messages that are communicated to people from professional hackers aiming at fooling …

MOE/RF: a novel phishing detection model based on revised multiobjective evolution optimization algorithm and random forest

E Zhu, Z Chen, J Cui, H Zhong - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
To effectively boost computer usage, machine learning models are used in several phishing
detection systems to classify enormous phishing datasets. Based on phishing patterns …

Dating phish: An analysis of the life cycles of phishing attacks and campaigns

V Drury, L Lux, U Meyer - … of the 17th International Conference on …, 2022 - dl.acm.org
Phishing attacks are still a general and world-wide threat to users of the Internet. In the past,
several approaches to detect phishing websites earlier and shorten the time frame between …

[HTML][HTML] Warning users about cyber threats through sounds

P Datta, AS Namin, KS Jones, R Hewett - SN Applied Sciences, 2021 - Springer
This paper reports a formative evaluation of auditory representations of cyber security threat
indicators and cues, referred to as sonifications, to warn users about cyber threats. Most …

[PDF][PDF] Machine learning based phishing e-mail detection

NA Unnithan, NB Harikrishnan, S Akarsh… - Security-CEN …, 2018 - ceur-ws.org
Phishing email detection is a significant threat in today's world. The rate at which phishing
are generated are tremendously increasing day by day. It is high time to deploy a self …

[HTML][HTML] Principales mecanismos para el enfrentamiento al phishing en las redes de datos

A Hernández Dominguez… - Revista Cubana de …, 2021 - scielo.sld.cu
En los últimos años se han utilizado diversos mecanismos para detectar ataques de
phishing. El papel desempeñado por las técnicas de aprendizaje automático ha sido …

Intelligent security for phishing online using adaptive neuro fuzzy systems

G Fehringer, P Barraclough - International Journal of …, 2017 - nrl.northumbria.ac.uk
Anti-phishing detection solutions employed in industry use blacklist-based approaches to
achieve low false-positive rates, but blacklist approaches utilizes website URLs only. This …