Open Access
Issue |
E3S Web Conf.
Volume 399, 2023
International Conference on Newer Engineering Concepts and Technology (ICONNECT-2023)
|
|
---|---|---|
Article Number | 04010 | |
Number of page(s) | 10 | |
Section | Computer Science | |
DOI | https://doi.org/10.1051/e3sconf/202339904010 | |
Published online | 12 July 2023 |
- A. Zainab, C. Hewage, L. Nawaf, I. Khan, Front. Comput. Sci. 3, 563060 (2021). S. Chanti, T. Chithralekha. Classification of anti-phishing solutions.” SN Comput. Sci 1, 1–18 (2020) [CrossRef] [Google Scholar]
- S. Sami, N. Aslam, L. Zhang. Decis. Support Syst. 107, 88–102 (2018) [CrossRef] [Google Scholar]
- R. Gowtham, I. Krishnamurthi, K. Sampath Sree Kumar. Decis. Support Syst 61, 12–22 (2014) [CrossRef] [Google Scholar]
- M. Eric, E. Kirda, C. Kruegel. Visual-similarity-based phishing detection, in Proceedings of the 4th international conference on Security and privacy in communication networks, 1–6. (2008) [Google Scholar]
- W. Liu, G. Huang, L. Xiaoyue, Z. Min, X. Deng. Detection of phishing webpages based on visual similarity, In Special interest tracks and posters of the 14th international conference on World Wide Web, 1060–1061. 2005. [Google Scholar]
- P. Josna, K.A.F. Fathima, S. Gayathri, G.E. Elias, A.A. Menon. A comparitative study of machine learning models for the detection of Phishing Websites, in International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), 1–7, (2022) [Google Scholar]
- S.O. Koray, E. Buber, O. Demir, B. Diri. Expert Syst. Appl. 117, 345–357 (2019) [CrossRef] [Google Scholar]
- B. Ebubekir, B. Diri, O.K. Sahingoz. NLP based phishing attack detection from URLs, in International Conference on Intelligent Systems Design and Applications, Springer, Cham, 608–618 (2017) [Google Scholar]
- C. Ye, W. Han, Y. Le. Anti-phishing based on automated individual white-list, in Proceedings of the 4th ACM workshop on Digital identity management, 51–60 (2008) [Google Scholar]
- D. Rachna, J.D. Tygar. The battle against phishing: Dynamic security skins, in Proceedings of the 2005 symposium on Usable privacy and security, 77–88 (2005). [Google Scholar]
- S.P. Kumar. An Emerging Solution for Detection of Phishing Attacks, in Cybersecurity Threats with New Perspectives. Intech Open, (2021) [Google Scholar]
- T.C. Lin, K.L. Chiew, S.N. Sze. Phishing webpage detection using weighted URL tokens for identity keywords retrieval, in 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, Springer, Singapore, 133–139 (2017) [Google Scholar]
- F. Anthony Y.L. Wenyin, X. Deng. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD), IEEE transactions on dependable and secure computing 3, 4 (2006) [Google Scholar]
- A.M. Nazmul, D. Sarma, F.F. Lima, I. Saha, S. Hossain. Phishing attacks detection using machine learning approach, in Third international conference on smart systems and inventive technology (ICSSIT), 1173–1179. (2020) [Google Scholar]
- G. Brij B.A. Tewari, A.K. Jain, D.P. Agrawal. Neural. Comput. Appl. 28, 12 (2017) [Google Scholar]
- R. Zulfikar. Phishing attacks and countermeasures. Handbook of information and communication security 433–448 (2010) [Google Scholar]
- C.K. Leng, K. Sheng, C. Yong, C.L. Tan. Expert Syst. Appl. 106 (2018) [Google Scholar]
- W. Min, R.C. Miller, S.L. Garfinkel. Do security toolbars actually prevent phishing attacks? in Proceedings of the SIGCHI conference on Human Factors in computing systems, 601–610 (2006) [Google Scholar]
- G. Sujata, N. Provos, M. Chew, A.D. Rubin. A framework for detection and measurement of phishing attacks, in Proceedings of the 2007 ACM workshop on Recurring malcode, 1–8 (2007) [Google Scholar]
- A. Mohamed, F. Alaca, S. Chiasson. Why phishing still works: User strategies for combating phishing attacks, International Journal of Human-Computer Studies 82 (2015) [Google Scholar]
- B. Ram, S. Mukkamala, A.H. Sung. Detection of phishing attacks: A machine learning approach” in Soft computing applications in industry, Springer, Berlin, Heidelberg, 373–383 (2008) [Google Scholar]
- C. Juan, C. Guo. Online detection and prevention of phishing attacks, in 2006 First International Conference on Communications and Networking in China, IEEE, 1–7 (2006) [Google Scholar]
- M. Jason, CERT Coordination Center. Technical trends in phishing attacks, 1 (2005) [Google Scholar]
- C. Jackson, D.R. Simon, D.S. Tan, A. Barth, An evaluation of extended validation and picture-in-picture phishing attacks, in International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg. 281–293 (2007) [Google Scholar]
- Chaudhry, J. Ahsenali, S.A. Chaudhry, R.G. Rittenhouse. Int. J. Sec. Appl. 10, 1 (2016) [Google Scholar]
- H. Tzipora, N. Memon, O. Nov. Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks, January 2, (2015). [Google Scholar]
- B. Abdul, M. Zafar, X. Liu, A.R. Javed, Z. Jalil, K. Kifayat. Telecommun. Syst. 76, 1 (2021) [CrossRef] [PubMed] [Google Scholar]
- P. Pawan, M. Kumar, R.R. Kompella, M. Gupta. Phishnet: predictive blacklisting to detect phishing attacks, in 2010 Proceedings IEEE INFOCOM, 1–5. IEEE, (2010) [Google Scholar]
- W. Longfei, X. Du, J. Wu. Effective defense schemes for phishing attacks on mobile computing platforms, IEEE Trans. Veh. Technol. 65, 8 (2015). [Google Scholar]
- C. Bhuvaneshwari, A. Manjunathan. Reimbursement of sensor nodes and path optimization, Materials Today: Proceedings, 45, 1547–1551 (2021). [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.