Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Intelligent phishing detection system for e-banking using fuzzy data mining

M Aburrous, MA Hossain, K Dahal, F Thabtah - Expert systems with …, 2010 - Elsevier
Detecting and identifying any phishing websites in real-time, particularly for e-banking, is
really a complex and dynamic problem involving many factors and criteria. Because of the …

Web wallet: preventing phishing attacks by revealing user intentions

M Wu, RC Miller, G Little - Proceedings of the second symposium on …, 2006 - dl.acm.org
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser
sidebar which users can use to submit their sensitive information online. It detects phishing …

Predicting phishing websites using classification mining techniques with experimental case studies

M Aburrous, MA Hossain, K Dahal… - 2010 seventh …, 2010 - ieeexplore.ieee.org
Classification Data Mining (DM) Techniques can be a very useful tool in detecting and
identifying e-banking phishing websites. In this paper, we present a novel approach to …

Machine learning and nature inspired based phishing detection: a literature survey

AA Akinyelu - International Journal on Artificial Intelligence Tools, 2019 - World Scientific
Phishing detection remains one of the most challenging problems currently faced by cyber
users as sophisticated phishing schemes evolves rapidly. This paper presents a …

Intelligent phishing website detection system using fuzzy techniques

M Aburrous, MA Hossain, F Thabatah… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
Phishing Websites are forged Web pages that are created by malicious people to mimic
Web pages of real Websites and it attempts to defraud people of their personal information …

A framework for predicting phishing websites using neural networks

A Martin, NB Anutthamaa, M Sathyavathy… - arXiv preprint arXiv …, 2011 - arxiv.org
In India many people are now dependent on online banking. This raises security concerns
as the banking websites are forged and fraud can be committed by identity theft. These …

Modified AES based algorithm for MPEG video encryption

P Deshmukh, V Kolhe - International Conference on …, 2014 - ieeexplore.ieee.org
Advances in digital content transmission have increased in the past few years. Security of
multimedia data is an imperative issue because of fast evolution of digital data exchanges …

{KeyForge}:{Non-Attributable} email from {Forward-Forgeable} signatures

MA Specter, S Park, M Green - 30th USENIX Security Symposium …, 2021 - usenix.org
Email breaches are commonplace, and they expose a wealth of personal, business, and
political data whose release may have devastating consequences. Such damage is …

[PDF][PDF] Bootstrapping the Adoption of Internet Security Protocols.

A Ozment, SE Schechter - WEIS, 2006 - infosecon.net
The deployment of network-wide security enhancements to the Internet has proven more
difficult than many had initially anticipated. We leverage existing models of networks' value …