The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phishing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (47) 2006 (67) 2007 (68) 2008 (76) 2009 (72) 2010 (55) 2011 (53) 2012 (45) 2013 (54) 2014 (68) 2015 (61) 2016 (90) 2017 (90) 2018 (105) 2019 (153) 2020 (192) 2021 (201) 2022 (235) 2023 (239) 2024 (62)
Publication types (Num. hits)
article(850) data(2) incollection(11) inproceedings(1144) phdthesis(25) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(175) IEEE Access(48) Comput. Secur.(44) eCrime(37) HICSS(19) CHI(18) Expert Syst. Appl.(18) CCS(17) WWW(17) Financial Cryptography(16) IEEE Secur. Priv.(16) ISI(16) HAISA(15) AMCIS(14) ARES(14) USENIX Security Symposium(14) More (+10 of total 795)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 428 occurrences of 209 keywords

Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung Protecting the web: phishing, malware, and other security threats. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, dns
25Naveen Agarwal, Scott G. Renfro, Arturo Bejar Phishing Forbidden. Search on Bibsonomy ACM Queue The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Changwei Liu, Sid Stamm Fighting unicode-obfuscated spam. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SpamAssassin, deobfuscated emails, obfuscated emails, spam emails, unicode characters
25Ronald C. Dodge, Aaron J. Ferguson Using Phishing for User Email Security Awareness. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor Trust modelling for online transactions: a phishing scenario. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Richard Clayton 0001 Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru ViWiD : Visible Watermarking Based Defense Against Phishing. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Klaus Plößl, Hannes Federrath, Thomas Nowey Protection Mechanisms Against Phishing Attacks. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Markus Jakobsson, Peter Finn, Nathaniel A. Johnson Why and How to Perform Fraud Experiments. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Mary Ellen Zurko, Andrew S. Patrick Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF User-centered security, cryptography
24Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan Anticipating Hidden Text Salting in Emails. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ross J. Anderson Information Security Economics - and Beyond. Search on Bibsonomy DEON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Timothy W. van der Horst, Kent E. Seamons pwdArmor: Protecting Conventional Password-Based Authentications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ross J. Anderson, Tyler Moore 0001 Information Security Economics - and Beyond. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane Using uncleanliness to predict future botnet addresses. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF botnets, reputation management, blacklists
24Shankar Sastry 0001 TRUST: in cyberspace and beyond. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Steven A. Myers Helping the Phish Detect the Lure. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Richard Clayton 0001, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo A Chat at the Old Phishin' Hole. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Markus Huber 0001, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF spam, phishing, Social networking sites, Internet computing
16J. D. Falk, Murray S. Kucherawy Battling Spam: The Evolution of Mail Feedback Loops. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mail feedback loops, mail abuse reporting format, MARF, complaint feedback loops, abuse reporting format, ARF, email standards, MAAWG, spam, email, Phishing, IETF
16Linda Dailey Paulson New Technique Provides Energy Wirelessly. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF IEEE 802.15.3c-2009, antiphishing, Phishgig, WiTricity, wireless power, MIT, Living Wall, conductive paint, sensors, phishing, wireless personal area networks, WPANs
16Vassilis Kostakos, Ian Oakley Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF situated services, trust, phishing, empirical evaluation
16Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri Combating Typo-Squatting for Safer Browsing. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Typosquatting, Phishing, Pharming
16Chia-Chen Lin 0001, Po-Hsuan Chiang A Novel Mutual Authentication Based on Data Embedding Technique. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Phishing, Mutual authentication, Data embedding
16Reshmi Maulik, Nabendu Chaki PhishNet: Enhancing the Security Aspect of IMS Users. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Vishing, SPIM, Spam, IMS, Phishing, Spoofing
16Erwin P. Rathgeb, Dirk Hoffstadt The E-Mail Honeypot System Concept, Implementation and Field Test Results. Search on Bibsonomy ICDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spam, Phishing, Honeypot
16Tim Kindberg Measuring trust in wi-fi hotspots. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF field study methodology, security, privacy, trust, pervasive computing, Wi-Fi, phishing
16Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering Enhancing web browsing security on public terminals using mobile composition. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF crimeware, split-trust, trusted personal device, user interface design, phishing
16Andrew Bortz, Dan Boneh Exposing private information by timing web applications. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web browser design, privacy, phishing, web application security, web spoofing
16ChangHee Lee, Heejo Lee A password stretching method using user specific salts. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF password stretching, user-specific salting, phishing
16Latanya Sweeney Protecting Job Seekers from Identity Theft. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing, google, identity theft
16Juline E. Mills, Sookeun Byun Cybercrimes against Consumers: Could Biometric Technology Be the Solution? Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cybertrust, phishing, cybercrime, pharming
16Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim Case Study: Online Banking Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Internet attacks, authentication, case study, phishing, online banking
16Peter Kuper A Warning to Industry--Fix It or Lose It. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF endpoint security, authentication, phishing, Internet security, Internet commerce
16Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell Protecting browser state from web privacy attacks. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web browser design, privacy, phishing, web spoofing
16Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin Safeguard against unicode attacks: generation and applications of UC-simlist. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure web identity, phishing, unicode
16Sara Sinclair, Sean W. Smith The TIPPI Point: Toward Trustworthy Interfaces. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF TIPPI, authentication methods, phishing
16Paul Madsen, Yuzo Koga, Kenji Takahashi Federated identity management for protecting users from ID theft. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF phishing, identity theft, federated identity
12Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Chidimma Opara, Yingke Chen, Bo Wei Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta Anti-phishing: A comprehensive perspective. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Richa Goenka, Meenu Chawla, Namita Tiwari A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Subhash Ariyadasa, Shantha Fernando, Subha Fernando SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Fouad Trad, Ali Chehab Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models. Search on Bibsonomy Mach. Learn. Knowl. Extr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Peter K. K. Loh, Aloysius Z. Y. Lee, Vivek Balachandran Towards a Hybrid Security Framework for Phishing Awareness Education and Defense. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey, Kuo-Chu Chang Investigation of Phishing Susceptibility with Explainable Artificial Intelligence. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Emmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed An application for predicting phishing attacks: A case of implementing a support vector machine learning model. Search on Bibsonomy Cyber Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Fang Feng, Qingguo Zhou, Zebang Shen, Xuhui Yang, Lihong Han, Jinqiang Wang The application of a novel neural network in the detection of phishing websites. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Faisal Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ivan Skula, Michal Kvet A Framework for Preparing a Balanced and Comprehensive Phishing Dataset. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Seunguk Yu, Yejin Kwon, Minju Kim, Ki-Seong Lee Korean Voice Phishing Detection Applying NER With Key Tags and Sentence-Level N-Gram. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ozgur Koray Sahingoz, Ebubekir Buber, Emin Kugu DEPHIDES: Deep Learning Based Phishing Detection System. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park Devising and Detecting Phishing Emails Using Large Language Models. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Maria Carla Calzarossa, Paolo Giudici, Rasha Zieni Explainable machine learning for phishing feature detection. Search on Bibsonomy Qual. Reliab. Eng. Int. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Haojie Sun, Zhaowei Liu, Shenqiang Wang, Haiyang Wang Adaptive Attention-Based Graph Representation Learning to Detect Phishing Accounts on the Ethereum Blockchain. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Saba Aslam, Hafsa Aslam, Arslan Manzoor, Hui Chen, Abdur Rasool AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection. Search on Bibsonomy Symmetry The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jintao Luo, Jiwei Qin, Ruijin Wang, Lu Li A Phishing Account Detection Model via Network Embedding for Ethereum. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sri Charan Gundla, M. Praveen Karthik, Middi Jashwanth Kumar Reddy, Gourav, Ashutosh Pankaj, Z. Stamenkovic, S. P. Raja 0001 A Feature Extraction Approach for the Detection of Phishing Websites Using Machine Learning. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Dongjie Liu, Jong-Hyouk Lee A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Tulsi Pawan Fowdur, M. A. N. Shaikh Abdoolla, Lokeshwar Doobur Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection. Search on Bibsonomy Int. J. Pervasive Comput. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sanjeev Shukla, Manoj Misra, Gaurav Varshney HTTP header based phishing attack detection using machine learning. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba 0001 ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar 0001 Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Tosin Ige, Christopher Kiekintveld, Aritran Piplai Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xiaowei Chen, Margault Sacré, Gabriele Lenzini, Samuel Greiff, Verena Distler, Anastasia Sergeeva The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Bryan Hooi, Hoon Wei Lim KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Daniel Timko, Muhammad Lutfor Rahman Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed A Sophisticated Framework for the Accurate Detection of Phishing Websites. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Furkan Çolhak, Mert Ilhan Ecevit, Bilal Emir Uçar, Reiner Creutzburg, Hasan Dag Phishing Website Detection through Multi-Model Analysis of HTML Content. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Daniel Nahmias, Gal Engelberg, Dan Klein, Asaf Shabtai Prompted Contextual Vectors for Spear-Phishing Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mohammad Amaz Uddin, Iqbal H. Sarker An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Avijit Gayen, Sukriti Santra, Ayush Dey, Angshuman Jana A Network Model to Study the Underlying Characteristics of Phishing Sites. Search on Bibsonomy IEEE Netw. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jan Pfeiffer OLG Frankfurt: Keine Haftung der Bank nach Phishing-Angriff. Search on Bibsonomy Comput. und Recht The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jieli Liu, Jinze Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Erzhou Zhu, Kang Cheng, Zhizheng Zhang 0010, Huabin Wang PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso Which factors predict susceptibility to phishing? An empirical study. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Arvind Prasad, Shalini Chandra PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Najwa Altwaijry, Isra Al-Turaiki, Reem Alotaibi, Fatimah Alakeel Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Thomas Nagunwa AI-driven approach for robust real-time detection of zero-day phishing websites. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jackie Scott, Yair Levy, Wei Li 0025, Ajoy Kumar Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Kumar Mangalam, Basant Subba PhishDetect: A BiLSTM based phishing URL detection framework using FastText embeddings. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sultan Asiri, Yang Xiao 0001, Saleh Alzahrani Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Kelvin Ovabor Cloud-Secure: An Investigation into Firefly and Grey Wolf Optimization Algorithms for Phishing Detection with Machine Learning Classifiers. Search on Bibsonomy SIGCSE (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ingvar Tjøstheim Exploring Data-Disclosure Vulnerabilities and Phishing Assessed by the Cognitive Reflection Test. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
12Yousra Javed, Iqra Irfan An Empirical Evaluation of the Current State of Phishing Comprehension in Pakistan. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
12Jordan Mazur, Christopher Rouff, Ali Tekeoglu ACPPS: Autonomic Computing based Phishing Protection System. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Robin Chataut, Prashnna Kumar Gyawali, Yusuf Usman Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 2033 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license