Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran |
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (3) ![In: Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III, pp. 162-182, 2023, Springer, 978-3-031-51478-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yufeng Xu, Lun Zhang, Turan Vural, Peng Qian, Yanbin Wang, Yuqing Fan, Ming Li, Xueyan Tang, Zheng Cao |
STFN: Spatio-Temporal Fusion Network to Detect Ethereum Phishing Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EITCE ![In: Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, EITCE 2023, Xiamen, China, October 20-22, 2023, pp. 599-605, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Lina Zhou, Dongsong Zhang, Zhihui Liu |
A Stage Model for Understanding Phishing Victimization Behavior in Embedded Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2023, Charlotte, NC, USA, October 2-3, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3773-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Vielka Angela V. Adap, Gabriel A. Castillo, Erskine Jerrell M. Delos Reyes, Edward B. Ronquillo, Larry A. Vea |
Do Not Feed the Phish: Phishing Website Detection Using URL-based Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSSE ![In: The 5th World Symposium on Software Engineering, WSSE 2023, Tokyo, Japan, September 22-24, 2023, pp. 135-141, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sarah Ying Zheng, Ingolf Becker |
Phishing to improve detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 334-343, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Mattia Mossano, Oksana Kulyk, Benjamin Maximilian Berens, Elena Marie Häußler, Melanie Volkamer |
Influence of URL Formatting on Users' Phishing URL Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 318-333, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Neeranjan Chitare, Lynne M. Coventry, James Nicholson |
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 344-355, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sangeeta Mittal |
Explaining URL Phishing Detection by Glass Box Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023, pp. 537-544, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Dakota Staples, Saqib Hakak, Paul Cook |
A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, August 21-23, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1387-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Christian Catalano, Andrea Chezzi, Vita Santa Barletta, Angelo Corallo |
Securing Web Technology and Navigation Against Phishing Through CNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MetroXRAINE ![In: IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering, MetroXRAINE 2023, Milano, Italy, October 25-27, 2023, pp. 944-948, 2023, IEEE, 979-8-3503-0080-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Mohit Singhal, Nihal Kumarswamy, Shreyasi Kinhekar, Shirin Nilizadeh |
Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom's Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWSM ![In: Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, ICWSM 2023, June 5-8, 2023, Limassol, Cyprus, pp. 796-807, 2023, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Betiel Tesfom, Feven Belay, Snit Daniel, Reem Salem, Safa Otoum |
Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023, pp. 684-689, 2023, IEEE, 979-8-3503-0460-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Javara Allah Bukhsh |
Guidelines for Developers and Recommendations for Users to Mitigate Phishing Attacks: An Interdisciplinary Research Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: Research Challenges in Information Science: Information Science and the Connected World - 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings, pp. 632-640, 2023, Springer, 978-3-031-33079-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Lynsay A. Shepherd, Andrea Szymkowiak |
Investigating Phishing Awareness Using Virtual Agents and Eye Movements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRA ![In: Proceedings of the 2023 Symposium on Eye Tracking Research and Applications, ETRA 2023, Tübingen, Germany, 30 May 2023 - 2 June 2023, pp. 45:1-45:2, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Seok-Jun Bu, Sung-Bae Cho |
Phishing URL Detection with Prototypical Neural Network Disentangled by Triplet Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS-ICEUTE ![In: International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023) - Proceedings, Salamanca, Spain, 5-7 September, 2023., pp. 132-143, 2023, Springer, 978-3-031-42518-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ayoub Alsarhan, Bashar Igried, Raad Mohammad Bani Saleem, Mohammad Alauthman, Mohammad Aljaidi |
Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMLR ![In: Asia Conference on Artificial Intelligence, Machine Learning and Robotics, AIMLR 2023, Bangkok, Thailand, September 15-17, 2023, pp. 5:1-5:7, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jeongkeun Shin, L. Richard Carley, Geoffrey B. Dobson, Kathleen M. Carley |
Modeling and Simulation of the Human Firewall Against Phishing Attacks in Small and Medium-Sized Businesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANNSIM ![In: Annual Modeling and Simulation Conference, ANNSIM 2023, Hamilton, ON, Canada, May 23-26, 2023, pp. 369-380, 2023, IEEE, 978-1-71-387328-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Nurul Amira Binti Mohd Zin, Mohd Faizal Ab Razak, Ahmad Firdaus, Ferda Ernawan, Nor Saradatul Akmar Zulkifli |
Machine Learning Technique for Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSECS ![In: 8th IEEE International Conference On Software Engineering and Computer Systems, ICSECS 2023, Penang, Malaysia, August 25-27, 2023, pp. 235-239, 2023, IEEE, 979-8-3503-1093-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sijia Li, Gaopeng Gou, Chang Liu 0049, Gang Xiong 0001, Zhen Li 0011, Junchao Xiao, Xinyu Xing |
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023, pp. 352-365, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rebecca Lynch, Lauren Saue-Fletcher |
Proxy in a Haystack: Uncovering and Classifying MFA Bypass Phishing Attacks in Large-Scale Authentication Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAMLIS ![In: Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023., pp. 122-133, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Shaoming Chen, Yiyang Wang, Xingkai Cheng |
An approach for detecting phishing websites by using search engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLCA ![In: 4th International Conference on Machine Learning and Computer Application, ICMLCA 2023, Hangzhou, China, October 27-29, 2023, pp. 344-347, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shatha Ghareeb, Mohammed Mahyoub, Jamila Mustafina |
Analysis of Feature Selection and Phishing Website Classification Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DeSE ![In: 15th International Conference on Developments in eSystems Engineering, DeSE 2023, Baghdad & Anbar, Iraq, January 9-12, 2023, pp. 178-183, 2023, IEEE, 979-8-3503-3514-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Aditya Mahesh Hegde, S. P. Bharath Kumar, R. Bhuvantej, R. Vyshak, V. Sarasvathi |
Spear Phishing Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACDS ![In: Advances in Computing and Data Sciences - 7th International Conference, ICACDS 2023, Kolkata, India, April 27-28, 2023, Revised Selected Papers, pp. 529-542, 2023, Springer, 978-3-031-37939-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sheng Fang, Tianyang Liu, Yaning Zhu, Wenjun Fan |
Classification and Identification of Phishing Websites based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberC ![In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2023, Jiangsu, China, November 2-4, 2023, pp. 397-403, 2023, IEEE, 979-8-3503-0869-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Nadezda Demidova, Philip Lawson, Jake Sloan |
Proactive Brand-Targeting Phishing Website Detection using a Hybrid Feature-based Approach with Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWG.EU Tech ![In: Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), Dublin, Ireland, June 21- 22, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Hauke Jan Lübbers |
Investigating Phishing Attacks using the Registration Data Access Protocol (RDAP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWG.EU Tech ![In: Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), Dublin, Ireland, June 21- 22, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Keting Yin, Binglong Ye |
Phishing Scam Detection for Ethereum Based on Community Enhanced Graph Convolutional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (11) ![In: Neural Information Processing - 30th International Conference, ICONIP 2023, Changsha, China, November 20-23, 2023, Proceedings, Part XI, pp. 191-206, 2023, Springer, 978-981-99-8144-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Che-Yu Wu, Cheng-Chung Kuo, Chu-Sing Yang |
Phishing Detection with Browser Extension Based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023, pp. 81-87, 2023, IEEE, 979-8-3503-4163-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Vincent Drury |
Phishing prevention: a multi-layered approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
12 | Mehmet Korkmaz |
Oltalama saldırılarının derin öğrenme tabanlı URL ve içerik analizi ile hibrit tespiti (Detection of phishing attacks by using deep learning based hybrid URL and content analysis) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
12 | Abdalraouf Almahdi Mohammed Alarbi |
New Machine Learning Classification Algorithm For Phishing URLs Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
12 | Muriel Frank, Lennart Jaeger, Lukas Manuel Ranft |
Contextual drivers of employees' phishing susceptibility: Insights from a field study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 160, pp. 113818, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sebastian Walter Schütz, Zachary R. Steelman, Rhonda A. Syler |
It's not just about accuracy: An investigation of the human factors in users' reliance on anti-phishing tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 163, pp. 113846, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | J. Anitha 0003, M. Kalaiarasu |
A new hybrid deep learning-based phishing detection system using MCS-DNN classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 34(8), pp. 5867-5882, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Julio Lamas Piñeiro, Lenis Wong Portillo |
Web architecture for URL-based phishing detection based on Random Forest, Classification Trees, and Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inteligencia Artif. ![In: Inteligencia Artif. 25(69), pp. 107-121, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Nagunwa, Paul Kearney, Shereen Fouad |
A machine learning approach for detecting fast flux phishing hostnames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 65, pp. 103125, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dongjie Liu, Guang-Gang Geng, Xinchang Zhang 0001 |
Multi-scale semantic deep fusion models for phishing website detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 209, pp. 118305, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Carlo Marcelo Revoredo da Silva, Bruno José Torres Fernandes, Eduardo Luzeiro Feitosa, Vinicius Cardoso Garcia |
Piracema.io: A rules-based tree model for phishing prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 191, pp. 116239, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Manuel Sánchez-Paniagua, Eduardo Fidalgo, Enrique Alegre, Rocío Alaíz-Rodríguez |
Phishing websites detection using a novel multipurpose dataset and web technologies features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 207, pp. 118010, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jinsol Yoo, Youngho Cho |
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 207, pp. 117893, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ali F. Al-Qahtani, Stefano Cresci |
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 16(5), pp. 324-345, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mithilesh Kumar Pandey, Munindra Kumar Singh, Saurabh Pal, Brij Bihari Tiwari |
Prediction of Phishing Websites Using Stacked Ensemble Method and Hybrid Features Selection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 3(6), pp. 488, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Bingxue Fu, Xing Yu, Tao Feng |
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 21(6), pp. 1223-1232, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | William Yeoh 0002, He Huang, Wang-Sheng Lee, Fadi Al Jafari, Rachel Mansson |
Simulated Phishing Attack and Embedded Training Campaign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 62(4), pp. 802-821, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alex Sumner, Xiaohong Yuan, Mohd Anwar, Maranda E. McBride |
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 62(5), pp. 975-997, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Padmalochan Panda, Alekha Kumar Mishra, Deepak Puthal |
A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(8), pp. 241, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos, Steven Furnell |
Evaluation of Contextual and Game-Based Training for Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(4), pp. 104, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jimmy Moedjahedy, Arief Setyanto, Fawaz Khaled Alarfaj, Mohammed Alreshoodi |
CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(8), pp. 229, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sanjiban Sekhar Roy, Ali Ismail Awad, Lamesgen Adugnaw Amare, Mabrie Tesfaye Erkihun, Mohd Anas |
Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(11), pp. 340, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Emtethal K. Alamri, Abdullah M. Alnajim, Suliman A. Alsuhibany |
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(3), pp. 82, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Santosh Kumar Birthriya, Ankit Kumar Jain |
A Comprehensive Survey of Phishing Email Detection and Protection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 31(4), pp. 411-440, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammad Almseidin, Mouhammd Alkasassbeh 0001, Maen Alzubi, Jamil Al-Sawwa |
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(2), pp. 24, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nikola Stevanovic |
Character and Word Embeddings for Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Informatics ![In: Comput. Informatics 41(5), pp. 1337-1357, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Bhawna Sharma, Parvinder Singh |
An improved anti-phishing model utilizing TF-IDF and AdaBoost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(26), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | K. Nirmal, B. Janet, Rajagopal Kumar 0001 |
Enhancing online security using selective DOM approach to counter phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(7), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Akanksha Arora, Hitendra Garg, Shivendra Shivani |
Anti-phishing technique based on dynamic image captcha using multi secret sharing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 88, pp. 103624, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori |
Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 30, pp. 841-858, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rolf Steinbrück |
Einen Schritt voraus - Phishing-resistente Authentifizierungsverfahren. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik Manag. ![In: Wirtschaftsinformatik Manag. 14(5), pp. 338-339, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Somesha M., Alwyn R. Pais |
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 11(3), pp. 279-320, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Safaa Magdy, Yasmine Abouelseoud, Mervat Mikhail |
Efficient spam and phishing emails filtering based on deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 206, pp. 108826, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed M. Alani, Hissam Tawfik |
PhishNot: A Cloud-Based Machine-Learning Approach to Phishing URL Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 218, pp. 109407, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lázaro Bustio-Martínez, Miguel Ángel Álvarez-Carmona, Vitali Herrera-Semenets, Claudia Feregrino Uribe, René Cumplido |
A lightweight data representation for phishing URLs detection in IoT environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 603, pp. 42-59, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rosemary Cosmas Tlatlaa Panga, Janeth Marwa, Jema David Ndibwile |
A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 2(3), pp. 466-489, June 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | H. L. Gururaj, Prithwijit Mitra, Soumyadip Koner, Sauvik Bal, Francesco Flammini, Janhavi V., Ravi Kumar V. |
Prediction of Phishing Websites Using AI Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 16(1), pp. 1-14, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane |
A Proposal Phishing Attack Detection System on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 16(1), pp. 1-27, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sk. Hasane Ahammad, Sunil Digamberrao Kale, Gopal D. Upadhye, Sandeep Dwarkanath Pande, E. Venkatesh Babu, Amol V. Dhumane, Dilip Kumar Jang Bahadur |
Phishing URL detection using machine learning methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Eng. Softw. ![In: Adv. Eng. Softw. 173, pp. 103288, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Subhash Ariyadasa, Shantha Fernando, Subha Fernando |
Combining Long-Term Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 82355-82375, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lakshmana Rao Kalabarige, Routhu Srinivasa Rao, Ajith Abraham, Lubna Abdel Kareim Gabralla |
Multilayer Stacked Ensemble Learning Model to Detect Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 79543-79552, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Sutter, Ahmet Selman Bozkir, Benjamin Gehring, Peter Berlich |
Avoiding the Hook: Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 100540-100565, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ilker Kara, Murathan Ok, Ahmet Ozaday |
Characteristics of Understanding URLs and Domain Names Features: The Detection of Phishing Websites With Machine Learning Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 124420-124428, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah |
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 118043-118057, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lizhen Tang, Qusay H. Mahmoud |
A Deep Learning-Based Framework for Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 1509-1521, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yi Wei, Yuji Sekiya |
Sufficiency of Ensemble Machine Learning Methods for Phishing Websites Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 124103-124113, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Saad Al-Ahmadi 0002, Afrah Alotaibi, Omar Alsaleh |
PDGAN: Phishing Detection With Generative Adversarial Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 42459-42468, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sergiu Eftimie, Radu Moinescu, Ciprian Racuciu |
Spear-Phishing Susceptibility Stemming From Personality Traits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 73548-73561, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rahmad Abdillah, Zarina Shukur, Masnizah Mohd, Mohd Zamri Murah |
Phishing Classification Techniques: A Systematic Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 41574-41591, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Manuel Sánchez-Paniagua, Eduardo Fidalgo Fernandez, Enrique Alegre, Mhd Wesam Al Nabki, Víctor González-Castro |
Phishing URL Detection: A Real-Case Scenario Through Login URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 42949-42960, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Do Nguyet Quang, Ali Selamat, Ondrej Krejcar, Enrique Herrera-Viedma, Hamido Fujita |
Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 36429-36463, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Said A. Salloum, Tarek Gaber, Sunil Vadera, Khaled Shaalan |
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 65703-65727, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mahdieh Sabahno, Fatemeh Safara |
ISHO: improved spotted hyena optimization algorithm for phishing website detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(24), pp. 34677-34696, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Parvinder Singh, Bhawna Sharma, Jasvinder Kaur |
An anti-phishing model based on similarity measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. Robotics ![In: Int. J. Comput. Vis. Robotics 12(2), pp. 141-155, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Parvinder Singh, Bhawna Sharma |
Anti-phishing model based on relative content mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. Robotics ![In: Int. J. Comput. Vis. Robotics 12(1), pp. 66-84, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta |
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Semantic Web Inf. Syst. ![In: Int. J. Semantic Web Inf. Syst. 18(1), pp. 1-24, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mansi Somani, Mamatha Balachandra |
Detection of phishing websites using data mining tools and techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 22(1/2), pp. 167-183, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yijun Xia, Jieli Liu, Jiajing Wu |
Phishing Detection on Ethereum via Attributed Ego-Graph Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 69(5), pp. 2538-2542, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jian Feng 0004, Yuqiang Qiao, Ou Ye, Ying Zhang |
Detecting phishing webpages via homology analysis of webpage structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 8, pp. e868, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Cagatay Catal, Görkem Giray, Bedir Tekinerdogan, Sandeep Kumar 0004, Suyash Shukla |
Applications of deep learning for phishing detection: a systematic literature review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 64(6), pp. 1457-1500, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Gregor Petric, Kai Roer |
The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telematics Informatics ![In: Telematics Informatics 67, pp. 101766, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dharmaraj R. Patil, Tareek M. Pattewar, Shailendra Pardeshi, Vipul Punjabi, Rajnikant Wagh |
Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Scalable Inf. Syst. ![In: EAI Endorsed Trans. Scalable Inf. Syst. 10(1), pp. e1, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sachin Minocha, Birmohan Singh |
A novel phishing detection system using binary modified equilibrium optimizer for feature selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 98, pp. 107689, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed Alshehri, Ahed Abugabah, Abdullah Algarni, Sultan Almotairi |
Character-level word encoding deep learning model for combating cyber threats in phishing URL detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 100, pp. 107868, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | May Almousa, Tianyang Zhang, Abdolhossein Sarrafzadeh, Mohd Anwar |
Phishing website detection: How effective are deep learning-based models and hyperparameter optimization? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 5(6), November/December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang, Peter Nimbe |
Investigation into Phishing Risk Behaviour among Healthcare Staff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 13(8), pp. 392, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Therdpong Daengsi, Phisit Pornpongtechavanich, Pongpisit Wuttidittachotti |
Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Educ. Inf. Technol. ![In: Educ. Inf. Technol. 27(4), pp. 4729-4752, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Erzhou Zhu, Zhile Chen, Jie Cui 0004, Hong Zhong 0001 |
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 19(4), pp. 4461-4478, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jiajing Wu, Qi Yuan, Dan Lin 0007, Wei You, Weili Chen, Chuan Chen 0001, Zibin Zheng |
Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 52(2), pp. 1156-1166, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dawn M. Sarno, Mark B. Neider |
So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 64(8), pp. 1379-1403, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Abdul A. Orunsolu, Adesina S. Sodiya, A. T. Akinwale |
A predictive model for phishing detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(2), pp. 232-247, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Franklin Tchakounté, Jim Carlson Teukeng Ngnintedem, Irepran Damakoa, Ahmadou Faissal, Franck Arnaud Kuate Fotso |
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A), pp. 8888-8898, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ankit Kumar Jain, B. B. Gupta 0001 |
A survey of phishing attack techniques, defence mechanisms and open research challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enterp. Inf. Syst. ![In: Enterp. Inf. Syst. 16(4), pp. 527-565, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|