Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Examining the impact of website take-down on phishing

T Moore, R Clayton - Proceedings of the anti-phishing working groups …, 2007 - dl.acm.org
Banks and other organisations deal with fraudulent phishing websites by pressing hosting
service providers to remove the sites from the Internet. Until they are removed, the fraudsters …

There Is No Free Phish: An Analysis of" Free" and Live Phishing Kits.

M Cova, C Kruegel, G Vigna - WOOT, 2008 - usenix.org
Phishing is a form of identity theft in which an attacker attempts to elicit confidential
information from unsuspecting victims. While in the past there has been significant work on …

[图书][B] A machine-learning approach to phishing detection and defense

IS Amiri, OA Akanbi, E Fazeldehkordi - 2014 - books.google.com
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive
information such as credit card numbers, bank account numbers, and user logins and …

E-mail classification for phishing defense

WN Gansterer, D Pölz - European conference on information retrieval, 2009 - Springer
We discuss a classification-based approach for filtering phishing messages in an e-mail
stream. Upon arrival, various features of every e-mail are extracted. This forms the basis of a …

[PDF][PDF] An Empirical Analysis of the Current State of Phishing Attack and Defence.

T Moore, R Clayton - WEIS, 2007 - Citeseer
Banks and other organisations deal with fraudulent phishing websites by pressing the
hosting service providers to remove the sites from the Internet. Until they are removed, the …

Binding between a layout engine and a scripting engine

T Leithead, J Rogers, M Pavlicic, CCC Man… - US Patent …, 2014 - Google Patents
Various embodiments provide an interface between a Web browser's layout engine and a
scripting engine. The interface enables objects from the layout engine to be recognized by a …

Memory model for a layout engine and scripting engine

T Leithead, JE Rogers, M Pavlicic, CCC Man… - US Patent …, 2014 - Google Patents
Various embodiments provide an interface between a Web browser's layout engine and a
scripting engine. The interface enables objects from the layout engine to be recognized by a …

[PDF][PDF] Collaborative detection of fast flux phishing domains.

CV Zhou, C Leckie, S Karunasekera - J. Networks, 2009 - Citeseer
Phishing is a significant security threat to users of Internet services. Nowadays, phishing has
become more resilient to detection and trace-back with the invention of Fast Flux (FF) …

Interface definition language extensions

T Leithead, J Rogers, M Pavlicic, CCC Man… - US Patent …, 2017 - Google Patents
Various embodiments provide an interface between a Web browser's layout engine and a
scripting engine. The interface enables objects from the layout engine to be recognized by a …