Identifying phishing attacks in communication networks using URL consistency features

NA Azeez, BB Salaudeen, S Misra… - International …, 2020 - inderscienceonline.com
Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed
by a text message, phone call or e-mail, requesting classified and sensitive information after …

Certified phishing: taking a look at public key certificates of phishing websites

V Drury, U Meyer - Fifteenth Symposium on Usable Privacy and Security …, 2019 - usenix.org
The share of phishing websites using HTTPS has been constantly increasing over the last
years. As a consequence, the simple user advice to check whether a website is HTTPS …

PhishBox: An approach for phishing validation and detection

JH Li, SD Wang - 2017 IEEE 15th Intl Conf on Dependable …, 2017 - ieeexplore.ieee.org
In this paper, we propose an approach, called PhishBox, to effectively collect phishing data
and generate models for phishing validation and detection. The proposed approach …

UnPhishMe: Phishing attack detection by deceptive login simulation through an Android mobile app

JD Ndibwile, Y Kadobayashi… - 2017 12th Asia Joint …, 2017 - ieeexplore.ieee.org
Phishing attacks have been increasing recently. Attackers use clever social engineering
techniques to convince their victims into clicking a malware or deceptive login-based …

HTTPS: A phishing attack in a network

DGN Benítez-Mejía, A Zacatenco-Santos… - Proceedings of the 7th …, 2017 - dl.acm.org
In this paper, we discuss the possibility of finding phishing attacks even in cases where the
victim sees in their web browser, the same URL as the legitimate website with the padlock …

网络钓鱼识别研究综述

付溪, 李晖, 赵兴文 - 网络与信息安全学报, 2020 - infocomm-journal.com
随着互联网的不断发展, 网络钓鱼给人们日常生活带来的威胁与日俱增. 网络钓鱼识别技术是
对抗钓鱼攻击的核心安全技术, 可以帮助人们有效避免钓鱼攻击引起的安全威胁. 首先 …

Search algorithms for discovery of web services

J Hicks, M Govindaraju, W Meng - … International Conference on …, 2007 - ieeexplore.ieee.org
Web services are designed to standardize interactions between heterogeneous applications
using Internet technologies. Within the framework of Internet search technologies, web …

Cosine and Soft Cosine Similarity-Based Anti-Phishing Model

B Sharma, P Singh, J Kaur - New Approaches for Multidimensional Signal …, 2021 - Springer
Phishing attack has posed a greater threat to user information over network. In addition to
the existence of various disguise illegal URL's, instances had been seen when users are …

An anti-phishing model based on similarity measurement

P Singh, B Sharma, J Kaur - International Journal of …, 2022 - inderscienceonline.com
Phishing has represented a more noteworthy danger to clients. In the current work, the
authors attempted to build up a powerful anti-phishing technique based on hybrid similarity …

[PDF][PDF] Antiphishing Model Based on Similarity Index and Neural Networks

B Sharma, DP Singh, DJ Kaur… - International Journal of …, 2019 - researchgate.net
Phishing is a negative technique that is used to steel private and confidential information
over the web. In the present work author proposed a hybrid similarity of Cosine and Soft …