|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
25 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. |
ACM Queue |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Changwei Liu, Sid Stamm |
Fighting unicode-obfuscated spam. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
SpamAssassin, deobfuscated emails, obfuscated emails, spam emails, unicode characters |
25 | Ronald C. Dodge, Aaron J. Ferguson |
Using Phishing for User Email Security Awareness. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
Trust modelling for online transactions: a phishing scenario. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Richard Clayton 0001 |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru |
ViWiD : Visible Watermarking Based Defense Against Phishing. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Klaus Plößl, Hannes Federrath, Thomas Nowey |
Protection Mechanisms Against Phishing Attacks. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Markus Jakobsson, Peter Finn, Nathaniel A. Johnson |
Why and How to Perform Fraud Experiments. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mary Ellen Zurko, Andrew S. Patrick |
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
User-centered security, cryptography |
24 | Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan |
Anticipating Hidden Text Salting in Emails. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson |
Information Security Economics - and Beyond. |
DEON |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Timothy W. van der Horst, Kent E. Seamons |
pwdArmor: Protecting Conventional Password-Based Authentications. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson, Tyler Moore 0001 |
Information Security Economics - and Beyond. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
24 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
24 | Shankar Sastry 0001 |
TRUST: in cyberspace and beyond. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Steven A. Myers |
Helping the Phish Detect the Lure. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard Clayton 0001, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo |
A Chat at the Old Phishin' Hole. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Markus Huber 0001, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch |
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
spam, phishing, Social networking sites, Internet computing |
16 | J. D. Falk, Murray S. Kucherawy |
Battling Spam: The Evolution of Mail Feedback Loops. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
mail feedback loops, mail abuse reporting format, MARF, complaint feedback loops, abuse reporting format, ARF, email standards, MAAWG, spam, email, Phishing, IETF |
16 | Linda Dailey Paulson |
New Technique Provides Energy Wirelessly. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
IEEE 802.15.3c-2009, antiphishing, Phishgig, WiTricity, wireless power, MIT, Living Wall, conductive paint, sensors, phishing, wireless personal area networks, WPANs |
16 | Vassilis Kostakos, Ian Oakley |
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
situated services, trust, phishing, empirical evaluation |
16 | Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri |
Combating Typo-Squatting for Safer Browsing. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
Typosquatting, Phishing, Pharming |
16 | Chia-Chen Lin 0001, Po-Hsuan Chiang |
A Novel Mutual Authentication Based on Data Embedding Technique. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
Phishing, Mutual authentication, Data embedding |
16 | Reshmi Maulik, Nabendu Chaki |
PhishNet: Enhancing the Security Aspect of IMS Users. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Vishing, SPIM, Spam, IMS, Phishing, Spoofing |
16 | Erwin P. Rathgeb, Dirk Hoffstadt |
The E-Mail Honeypot System Concept, Implementation and Field Test Results. |
ICDS |
2008 |
DBLP DOI BibTeX RDF |
Spam, Phishing, Honeypot |
16 | Tim Kindberg |
Measuring trust in wi-fi hotspots. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
field study methodology, security, privacy, trust, pervasive computing, Wi-Fi, phishing |
16 | Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering |
Enhancing web browsing security on public terminals using mobile composition. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
crimeware, split-trust, trusted personal device, user interface design, phishing |
16 | Andrew Bortz, Dan Boneh |
Exposing private information by timing web applications. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
web browser design, privacy, phishing, web application security, web spoofing |
16 | ChangHee Lee, Heejo Lee |
A password stretching method using user specific salts. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
password stretching, user-specific salting, phishing |
16 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
16 | Juline E. Mills, Sookeun Byun |
Cybercrimes against Consumers: Could Biometric Technology Be the Solution? |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
cybertrust, phishing, cybercrime, pharming |
16 | Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim |
Case Study: Online Banking Security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Internet attacks, authentication, case study, phishing, online banking |
16 | Peter Kuper |
A Warning to Industry--Fix It or Lose It. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
endpoint security, authentication, phishing, Internet security, Internet commerce |
16 | Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell |
Protecting browser state from web privacy attacks. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
web browser design, privacy, phishing, web spoofing |
16 | Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin |
Safeguard against unicode attacks: generation and applications of UC-simlist. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
secure web identity, phishing, unicode |
16 | Sara Sinclair, Sean W. Smith |
The TIPPI Point: Toward Trustworthy Interfaces. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
TIPPI, authentication methods, phishing |
16 | Paul Madsen, Yuzo Koga, Kenji Takahashi |
Federated identity management for protecting users from ID theft. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
phishing, identity theft, federated identity |
12 | Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen |
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. |
Decis. Support Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chidimma Opara, Yingke Chen, Bo Wei |
Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta |
Anti-phishing: A comprehensive perspective. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Richa Goenka, Meenu Chawla, Namita Tiwari |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Subhash Ariyadasa, Shantha Fernando, Subha Fernando |
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fouad Trad, Ali Chehab |
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models. |
Mach. Learn. Knowl. Extr. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Peter K. K. Loh, Aloysius Z. Y. Lee, Vivek Balachandran |
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense. |
Future Internet |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey, Kuo-Chu Chang |
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence. |
Future Internet |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed |
An application for predicting phishing attacks: A case of implementing a support vector machine learning model. |
Cyber Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fang Feng, Qingguo Zhou, Zebang Shen, Xuhui Yang, Lihong Han, Jinqiang Wang |
The application of a novel neural network in the detection of phishing websites. |
J. Ambient Intell. Humaniz. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Faisal Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub |
Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ivan Skula, Michal Kvet |
A Framework for Preparing a Balanced and Comprehensive Phishing Dataset. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Seunguk Yu, Yejin Kwon, Minju Kim, Ki-Seong Lee |
Korean Voice Phishing Detection Applying NER With Key Tags and Sentence-Level N-Gram. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ozgur Koray Sahingoz, Ebubekir Buber, Emin Kugu |
DEPHIDES: Deep Learning Based Phishing Detection System. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park |
Devising and Detecting Phishing Emails Using Large Language Models. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho |
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo |
A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Maria Carla Calzarossa, Paolo Giudici, Rasha Zieni |
Explainable machine learning for phishing feature detection. |
Qual. Reliab. Eng. Int. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Haojie Sun, Zhaowei Liu, Shenqiang Wang, Haiyang Wang |
Adaptive Attention-Based Graph Representation Learning to Detect Phishing Accounts on the Ethereum Blockchain. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Saba Aslam, Hafsa Aslam, Arslan Manzoor, Hui Chen, Abdur Rasool |
AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection. |
Symmetry |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jintao Luo, Jiwei Qin, Ruijin Wang, Lu Li |
A Phishing Account Detection Model via Network Embedding for Ethereum. |
IEEE Trans. Circuits Syst. II Express Briefs |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sri Charan Gundla, M. Praveen Karthik, Middi Jashwanth Kumar Reddy, Gourav, Ashutosh Pankaj, Z. Stamenkovic, S. P. Raja 0001 |
A Feature Extraction Approach for the Detection of Phishing Websites Using Machine Learning. |
J. Circuits Syst. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Dongjie Liu, Jong-Hyouk Lee |
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. |
J. Netw. Syst. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tulsi Pawan Fowdur, M. A. N. Shaikh Abdoolla, Lokeshwar Doobur |
Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection. |
Int. J. Pervasive Comput. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sanjeev Shukla, Manoj Misra, Gaurav Varshney |
HTTP header based phishing attack detection using machine learning. |
Trans. Emerg. Telecommun. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba 0001 |
ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar 0001 |
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad |
Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das |
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tosin Ige, Christopher Kiekintveld, Aritran Piplai |
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaowei Chen, Margault Sacré, Gabriele Lenzini, Samuel Greiff, Verena Distler, Anastasia Sergeeva |
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Bryan Hooi, Hoon Wei Lim |
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Timko, Muhammad Lutfor Rahman |
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed |
A Sophisticated Framework for the Accurate Detection of Phishing Websites. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Furkan Çolhak, Mert Ilhan Ecevit, Bilal Emir Uçar, Reiner Creutzburg, Hasan Dag |
Phishing Website Detection through Multi-Model Analysis of HTML Content. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Nahmias, Gal Engelberg, Dan Klein, Asaf Shabtai |
Prompted Contextual Vectors for Spear-Phishing Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohammad Amaz Uddin, Iqbal H. Sarker |
An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph |
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool |
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Avijit Gayen, Sukriti Santra, Ayush Dey, Angshuman Jana |
A Network Model to Study the Underlying Characteristics of Phishing Sites. |
IEEE Netw. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jan Pfeiffer |
OLG Frankfurt: Keine Haftung der Bank nach Phishing-Angriff. |
Comput. und Recht |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jieli Liu, Jinze Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng |
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li |
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Erzhou Zhu, Kang Cheng, Zhizheng Zhang 0010, Huabin Wang |
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer |
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso |
Which factors predict susceptibility to phishing? An empirical study. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Arvind Prasad, Shalini Chandra |
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar |
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. |
J. Syst. Softw. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Najwa Altwaijry, Isra Al-Turaiki, Reem Alotaibi, Fatimah Alakeel |
Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Nagunwa |
AI-driven approach for robust real-time detection of zero-day phishing websites. |
Int. J. Inf. Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jackie Scott, Yair Levy, Wei Li 0025, Ajoy Kumar |
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. |
ICISSP |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das |
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. |
COMSNETS |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kumar Mangalam, Basant Subba |
PhishDetect: A BiLSTM based phishing URL detection framework using FastText embeddings. |
COMSNETS |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sultan Asiri, Yang Xiao 0001, Saleh Alzahrani |
Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model. |
ACM Southeast Regional Conference |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kelvin Ovabor |
Cloud-Secure: An Investigation into Firefly and Grey Wolf Optimization Algorithms for Phishing Detection with Machine Learning Classifiers. |
SIGCSE (2) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ingvar Tjøstheim |
Exploring Data-Disclosure Vulnerabilities and Phishing Assessed by the Cognitive Reflection Test. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
12 | Yousra Javed, Iqra Irfan |
An Empirical Evaluation of the Current State of Phishing Comprehension in Pakistan. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
12 | Jordan Mazur, Christopher Rouff, Ali Tekeoglu |
ACPPS: Autonomic Computing based Phishing Protection System. |
CCWC |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Robin Chataut, Prashnna Kumar Gyawali, Yusuf Usman |
Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection. |
CCWC |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 2033 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|