Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Omran Salem, Alamgir Hossain, Mumtaz Kamala |
Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Intelligent tool, Security, Fuzzy Logic, Phishing, Social Engineering |
29 | Jordan Crain, Lukasz Opyrchal, Atul Prakash 0001 |
Fighting Phishing with Trusted Email. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
privacy, spam, email, phishing |
29 | Hossain Shahriar, Mohammad Zulkernine |
PhishTester: Automatic Testing of Phishing Attacks. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting |
29 | Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen |
Preventing False Positives in Content-Based Phishing Detection. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
security, Internet, network, phishing |
29 | Md. Rafiqul Islam 0001, Jemal H. Abawajy, Matthew J. Warren |
Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. |
ISPAN |
2009 |
DBLP DOI BibTeX RDF |
analyser, classifiers, Phishing, multi-tier |
29 | Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai |
"Reminder: please update your details": Phishing Trends. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
worms and trojon, spam, Phishing, virus, social engineering |
29 | Amir Herzberg, Ahmad Jbara |
Security and identification indicators for browsers against spoofing and phishing attacks. |
ACM Trans. Internet Techn. |
2008 |
DBLP DOI BibTeX RDF |
Human-computer interaction, phishing, secure usability, Web spoofing |
29 | David Geer |
Security Technologies Go Phishing. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
computer fraud, security, phishing, hackers |
28 | Ahmed Obied, Reda Alhajj |
Fraudulent and malicious sites on the web. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming |
28 | Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate |
Authenticating ubiquitous services: a study of wireless hotspot access. |
UbiComp |
2009 |
DBLP DOI BibTeX RDF |
authentication, wi-fi, phishing, ubiquitous services |
28 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
28 | Paul C. van Oorschot, Tao Wan 0004 |
TwoStep: An Authentication Method Combining Text and Graphical Passwords. |
MCETECH |
2009 |
DBLP DOI BibTeX RDF |
Security, Phishing, User Authentication, Graphical Passwords |
28 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
28 | Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
Provably secure browser-based user-aware mutual authentication over TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
browser-based protocols, phishing, user authentication, TLS |
28 | Frederik De Keukelaere, Sumeer Bhola, Michael Steiner 0001, Suresh Chari, Sachiko Yoshihama |
SMash: secure component model for cross-domain mashups on unmodified browsers. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
web 2.0, mashup, phishing, browser, component model |
28 | Markus Jakobsson, Sid Stamm |
Invasive browser sniffing and countermeasures. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
browser cache, sniffing, personalization, phishing, cascading style sheets |
28 | Ari Juels, Markus Jakobsson, Tom N. Jagatic |
Cache Cookies for Browser Authentication (Extended Abstract). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
cache cookies, privacy, personalization, malware, Web browser, phishing, pharming |
28 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
28 | George Lawton |
E-Mail Authentication Is Here, but Has It Arrived Yet? |
Computer |
2005 |
DBLP DOI BibTeX RDF |
E-mail authentication, Spam, Phishing |
28 | Neal Leavitt |
Instant Messaging: A New Target for Hackers. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
security risks, instant messaging, phishing, malicious code |
28 | Bruce Schneier |
Customers, Passwords, and Web Sites. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Trojans, stealing passwords, phishing |
25 | Daniel Köhler, Wenzel Pünter, Christoph Meinel |
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues. |
ACNS (3) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Lina Zhou, Jaewan Lim, Dongsong Zhang |
The Effects of Email Illegitimacy and Phishing Behavior Training on Eye Movement Behavior in Spear Phishing Detection. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
25 | Luis Felipe Castaño, Eduardo Fidalgo Fernandez, Rocío Alaíz-Rodríguez, Enrique Alegre |
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Anne Clara Tally, Jacob Abbott, Ashley M. Bochner, Sanchari Das, Christena Nippert-Eng |
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. |
Proc. ACM Hum. Comput. Interact. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Elisabeth J. D. Slifkin, Mark B. Neider |
Phishing interrupted: The impact of task interruptions on phishing email classification. |
Int. J. Hum. Comput. Stud. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar 0001, Laura Hartley, Winston Lewinsmith, Irina Baetu |
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. |
SECRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirrnare, Vivek Balachandran, Tamal Das |
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector. |
SOLI |
2023 |
DBLP DOI BibTeX RDF |
|
25 | David Hasselquist, Elsa Kihlberg Gawell, Axel Karlström, Niklas Carlsson |
Phishing in Style: Characterizing Phishing Websites in the Wild. |
TMA |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh |
Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services. |
IMC |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Fiona Carroll, John Ayooluwa Adejobi, Reza Montasari |
How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Filipo Sharevski, Peter Jachim |
"Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant. |
EURASIP J. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva |
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han |
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Aymen Hamoud, Esma Aïmeur, Mohamed Benmohammed |
Individual Processing of Phishing Emails: Towards a Phishing Detection Framework. |
Int. J. Secur. Priv. Pervasive Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Alejandro Barreiro Herrera, Jorge Eliecer Camargo Mendoza |
A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection. |
ICAI |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rene Roepke, Vincent Drury, Philipp Peeß, Tobias Johnen, Ulrike Meyer, Ulrik Schroeder |
More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails. |
GALA |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone |
Investigating the Effect of Phishing Believability on Phishing Reporting. |
EuroS&P Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level. |
ACIIDS (2) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Kanishka Misra, Julia Taylor Rayz |
LMs go Phishing: Adapting Pre-trained Language Models to Detect Phishing Emails. |
WI/IAT |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans |
Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans |
COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Tatyana Stojnic, Dinusha Vatsalan, Nalin A. G. Arachchilage |
Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails. |
Secur. Priv. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Ahmed Abbasi, David G. Dobolyi, Anthony Vance, Fatemeh Mariam Zahedi |
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites. |
Inf. Syst. Res. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem |
A Systematic Literature Review on Phishing and Anti-Phishing Techniques. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans |
A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks. |
UMAP (Adjunct Publication) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Joseph Aneke, Carmelo Ardito, Giuseppe Desolda |
Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. |
HCI (27) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Sven Schöbel, Rene Roepke, Ulrik Schroeder |
Phishing Academy: Evaluation of a Digital Educational Game on URLs and Phishing. |
GALA |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Hugo L. J. Bijmans, Tim M. Booij, Anneke Schwedersky, Aria Nedgabat, Rolf van Wegberg |
Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. |
USENIX Security Symposium |
2021 |
DBLP BibTeX RDF |
|
25 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level. |
DASFAA (Workshops) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level. |
ACIIDS |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Florian Quinkert, Martin Degeling, Thorsten Holz |
Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. |
DIMVA |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Rui Chen 0002, Joana Gaia, H. Raghav Rao |
An examination of the effect of recent phishing encounters on phishing susceptibility. |
Decis. Support Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage |
Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Alessandro Ecclesie Agazzi |
Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Piers Bayl-Smith, Daniel Sturman, Mark W. Wiggins |
Cue Utilization, Phishing Feature and Phishing Email Detection. |
Financial Cryptography Workshops |
2020 |
DBLP DOI BibTeX RDF |
|
25 | René Röpke, Klemens Koehler, Vincent Drury, Ulrik Schroeder, Martin R. Wolf, Ulrike Meyer |
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education. |
MSTEC |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Vincent Drury, Ulrike Meyer |
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation. |
EuroS&P Workshops |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Sánchez-Paniagua, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre |
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. |
CISIS |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Daniel E. O'Leary |
What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis. |
J. Inf. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | A. J. Burns 0001, M. Eric Johnson, Deanna D. Caputo |
Spear phishing in a barrel: Insights from a targeted phishing campaign. |
J. Organ. Comput. Electron. Commer. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage |
Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? |
ACIS |
2019 |
DBLP BibTeX RDF |
|
25 | Ghassan Ahmed Ali |
Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails. |
IRICT |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, Erik Andersen 0001 |
What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. |
CHI |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ulrike Meyer, Vincent Drury |
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites. |
SOUPS @ USENIX Security Symposium |
2019 |
DBLP BibTeX RDF |
|
25 | Chuan Pham, Luong Anh Tuan Nguyen, Nguyen Hoang Tran, Eui-Nam Huh, Choong Seon Hong |
Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks. |
IEEE Trans. Netw. Serv. Manag. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jaclyn Martin, Chad Dubé, Michael D. Coovert |
Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. |
Hum. Factors |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. |
eCrime |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Alberto Giaretta 0001, Nicola Dragoni |
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. |
SEDA |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Edwin Donald Frauenstein |
An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours. |
ISSA (Revised Selected Papers) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang |
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. |
IEEE Access |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Daniela Oliveira 0001, Harold Rocha, Huizi Yang, Donovan M. Ellis, Sandeep Dommaraju, Melis Muradoglu, Devon Weir, Adam Soliman, Tian Lin, Natalie C. Ebner |
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. |
CHI |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Brynne Harrison, Elena Svetieva, Arun Vishwanath |
Individual processing of phishing emails: How attention and elaboration protect against phishing. |
Online Inf. Rev. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
25 | Jerry Chih-Yuan Sun, Shih-Jou Yu, Sunny S. J. Lin, Shian-Shyong Tseng |
The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference. |
Comput. Hum. Behav. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Brynne Harrison, Arun Vishwanath, H. Raghav Rao |
A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing. |
HICSS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Sunil Chaudhary, Eleni Berki, Linfeng Li, Juri Valtanen |
Time Up for Phishing with Effective Anti-Phishing Research Strategies. |
Int. J. Hum. Cap. Inf. Technol. Prof. |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Swapan Purkait |
Examining the effectiveness of phishing filters against DNS based phishing attacks. |
Inf. Comput. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson |
Why phishing still works: User strategies for combating phishing attacks. |
Int. J. Hum. Comput. Stud. |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. |
ACIS |
2015 |
DBLP BibTeX RDF |
|
25 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
25 | Eric Rutger Leukfeldt |
Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization. |
Cyberpsychology Behav. Soc. Netw. |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging phishing trends and effectiveness of the anti-phishing landing page. |
eCrime |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Rucha Tembe, Olga A. Zielinska, Yuqi Liu, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Xi Ge |
Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples. |
HotSoS |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling |
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. |
Sicherheit |
2014 |
DBLP BibTeX RDF |
|
25 | K. Jansson, Rossouw von Solms |
Phishing for phishing awareness. |
Behav. Inf. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Ammar Almomani, Brij B. Gupta, Tat Chee Wan, Altyeb Altaher, Selvakumar Manickam |
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email |
CoRR |
2013 |
DBLP BibTeX RDF |
|
25 | Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai |
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. |
ICC |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Jingguo Wang, Tejaswini C. Herath, Rui Chen 0002, Arun Vishwanath, H. Raghav Rao |
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. |
IEEE Trans. Prof. Commun. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | John Yearwood, Musa A. Mammadov, Dean Webb |
Profiling phishing activity based on hyperlinks extracted from phishing emails. |
Soc. Netw. Anal. Min. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Weiwei Zhuang, Qingshan Jiang, Tengke Xiong |
An Intelligent Anti-phishing Strategy Model for Phishing Website Detection. |
ICDCS Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Sophie Gastellier-Prevost |
Vers une détection des attaques de phishing et pharming côté client. (Defeating phishing and pharming attacks at the client-side). |
|
2011 |
RDF |
|
25 | Gang Liu, Bite Qiu, Liu Wenyin |
Automatic Detection of Phishing Target from Phishing Webpage. |
ICPR |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Maher Ragheb Mohammed Abur-rous |
Phishing website detection using intelligent data mining techniques : design and development of an intelligent association classification mining fuzzy based scheme for phishing website detection with an emphasis on e-banking. |
|
2010 |
RDF |
|
25 | Abdullah M. Alnajim, Malcolm Munro |
An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection. |
INCoS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Abdullah M. Alnajim |
Fighting Internet fraud : anti-phishing effectiveness for phishing websites detection. |
|
2009 |
RDF |
|
25 | Peter Henry |
A Review of: "Phishing Exposed: Uncover Secrets from the Dark Side. By Lance James Phishing: Cutting the Identity Theft Line. By Rachel Lininger and Russell Dean Uines". |
J. Digit. Forensic Pract. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Christopher Abad |
The economy of phishing: A survey of the operations of the phishing market. |
First Monday |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki |
PAKE-based mutual HTTP authentication for preventing phishing attacks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
http, mutual authentication, web systems |