|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Ahmed M. Elmisery, Mirela Sertovic |
Modular Platform for Detecting and Classifying Phishing Websites Using Cyber Threat Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. ![In: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | S. Priya, S. Selvakumar 0001, R. Leela Velusamy |
PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 125(1), pp. 755-784, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ankit Kumar Jain, Ninmoy Debnath, Arvind Kumar Jain |
APuML: An Efficient Approach to Detect Mobile Phishing Webpages using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 125(4), pp. 3227-3248, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Arash Negahdari Kia, Finbarr Murphy, Zahra Dehghani Mohammadabadi, Parisa Shamsi |
Using network structure and community detection to discover important website features when distinguishing between phishing and legitimate ones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.02889, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mariya Shmalko, Alsharif Abuadbba, Raj Gaire 0001, Tingmin Wu, Hye-Young Paik, Surya Nepal |
Profiler: Profile-Based Model to Detect Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.08745, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama |
PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.07882, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Medha Atre, Birendra Jha, Ashwini Rao |
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.02446, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alsharif Abuadbba, Shuo Wang 0012, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire 0001, Seyit Camtepe, Surya Nepal |
Towards Web Phishing Detection Limitations and Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.00985, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph |
Email Summarization to Assist Users in Phishing Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.13380, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Filipo Sharevski, Amy Devine, Emma Pieroni, Peter Jachim |
Gone Quishing: A Field Study of Phishing with Malicious QR Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.04086, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Anupama Ray, Sai Sakunthala Guddanti, Vishnu Ajith, Dhinakaran Vinayagamurthy |
Classical ensemble of Quantum-classical ML algorithms for Phishing detection in Ethereum transaction networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.00004, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Panpan Li, Yunyi Xie, Xinyao Xu, Jiajun Zhou, Qi Xuan |
Phishing Fraud Detection on Ethereum using Graph Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.08194, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Giovanni Apruzzese, V. S. Subrahmanian |
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.05380, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali |
Improving Phishing Detection Via Psychological Trait Scoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.06792, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | F. Ley Sylvester |
Mobile device users' susceptibility to phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.01823, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jinhuan Wang, Pengtao Chen, Xinyao Xu, Jiajing Wu, Meng Shen, Qi Xuan, Xiaoniu Yang |
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.12938, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo |
Classification of Web Phishing Kits for early detection by platform providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.08273, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim |
Phishing URL Detection: A Network-based Approach Robust to Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.01454, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mousa Jari |
An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.11197, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dinil Mon Divakaran, Adam Oest |
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.07411, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Orel Lavie, Asaf Shabtai, Gilad Katz |
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.09033, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Farnoosh Shirani Bidabadi, Shuaifang Wang |
A new weighted ensemble model for phishing detection based on feature selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.11125, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu 0001, Issa Khalil |
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.13155, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Kalaharsha Pagadala |
Detecting Phishing sites Without Visiting them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.05121, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Pow Chang |
Multi-Layer Perceptron Neural Network for Improving Detection Performance of Malicious Phishing URLs Without Affecting Other Attack Types Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.00774, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Fatima Salahdine, Zakaria El Mrabet, Naima Kaabouch |
Phishing Attacks Detection - A Machine Learning-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.10752, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Giovanni Apruzzese, Mauro Conti, Ying Yuan |
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.13660, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh |
A Large-Scale Analysis of Phishing Websites Hosted on Free Web Hosting Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.02563, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rizka Purwanto, Arindam Pal 0001, Alan Blair 0001, Sanjay K. Jha |
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.10801, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello |
SoK: Human-Centered Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.07905, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Sijia Li, Gaopeng Gou, Chang Liu 0049, Chengshang Hou, Zhenzhen Li, Gang Xiong 0001 |
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.13442, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mitchell Ackerley, Ben W. Morrison, Kate Ingrey, Mark W. Wiggins, Piers Bayl-Smith, Natalie M. V. Morrison |
Errors, Irregularities, and Misdirection: Cue Utilisation and Cognitive Reflection in the Diagnosis of Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australas. J. Inf. Syst. ![In: Australas. J. Inf. Syst. 26, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Giuseppe Desolda, Lauren S. Ferro, Andrea Marrella, Tiziana Catarci, Maria Francesca Costabile |
Human Factors in Phishing Attacks: A Systematic Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 54(8), pp. 173:1-173:35, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rizwan Ur Rahman, Lokesh Yadav, Deepak Singh Tomar |
Phish-Shelter: A Novel Anti-Phishing Browser Using Fused Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. Res. ![In: J. Inf. Technol. Res. 15(1), pp. 1-23, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Hossein Shirazi, Katherine Haynes, Indrakshi Ray |
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ubiquitous Syst. Pervasive Networks ![In: J. Ubiquitous Syst. Pervasive Networks 17(1), pp. 35-42, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed, Mohammed Al-Sarem, Faisal Saeed, Tawfik Al Hadhrami, Mohammad T. Alshammari, Abdulrahman Alreshidi, Talal Sarheed Alshammari |
Phishing Websites Detection by Using Optimized Stacking Ensemble Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 41(1), pp. 109-125, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | R. Sakunthala Jenni, S. Shankar |
Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 41(2), pp. 525-538, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dinil Mon Divakaran, Adam Oest |
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 20(5), pp. 86-95, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 20(2), pp. 10-21, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Suganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu Ahmad |
To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 30(1), pp. 37-62, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Piers Bayl-Smith, Ronnie Taib, Kun Yu, Mark W. Wiggins |
Response to a phishing attack: persuasion and protection motivation in an organizational context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 30(1), pp. 63-78, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sanchari Das, Christena Nippert-Eng, L. Jean Camp |
Evaluating user susceptibility to phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 30(1), pp. 1-18, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ben Stewart S., Dhanush N., Santhosh G., Angelin Gladston |
Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 12(1), pp. 1-24, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Exploring and Evaluating Different Game Mechanics for Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Serious Games ![In: Int. J. Serious Games 9(3), pp. 23-41, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Chenguang Wang, Yuanyuan Chen |
TCURL: Exploring hybrid transformer and convolutional neural network on phishing URL detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Based Syst. ![In: Knowl. Based Syst. 258, pp. 109955, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rizka Widyarini Purwanto, Arindam Pal 0001, Alan Blair 0001, Sanjay Jha 0001 |
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 1497-1512, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu |
ADVERT: An Adaptive and Data-Driven Attention Enhancement Mechanism for Phishing Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 2585-2597, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rundong Yang, Kangfeng Zheng, Bin Wu 0012, Di Li, Zhe Wang 0031, Xiujuan Wang |
Predicting User Susceptibility to Phishing Based on Multidimensional Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Intell. Neurosci. ![In: Comput. Intell. Neurosci. 2022, pp. 7058972:1-7058972:11, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Faan Zheng, Qiao Yan, Victor C. M. Leung, F. Richard Yu, Zhong Ming 0001 |
HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 114, pp. 102584, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jerry Chih-Yuan Sun, Hsiu-Shan Lin |
Effects of integrating an interactive response system into flipped classroom instruction on students' anti-phishing self-efficacy, collective efficacy, and sequential behavioral patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Educ. ![In: Comput. Educ. 180, pp. 104430, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Anjaneya Awasthi, Noopur Goel |
Phishing website prediction using base and ensemble classifier techniques with cross-validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 5(1), pp. 22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Qi Li, Mingyu Cheng, Junfeng Wang 0003, Bowen Sun |
LSTM Based Phishing Detection for Big Email Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Big Data ![In: IEEE Trans. Big Data 8(1), pp. 278-288, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Routhu Srinivasa Rao, Amey Umarekar, Alwyn Roshan Pais |
Application of word embedding and machine learning in detecting phishing websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 79(1), pp. 33-45, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ala Mughaid, Shadi AlZu'bi, Adnan Hnaif, Salah Taamneh, Asma Alnajjar, Esraa Abu Elsoud |
An intelligent cyber security phishing detection system using deep learning techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 25(6), pp. 3819-3828, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Satheesh Kumar Marimuthu, Srinivasagan Kalampatti Gopalasamy, Jalel Ben-Othman |
Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 52(2), pp. 459-481, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur |
Improving the classification of phishing websites using a hybrid algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Intell. ![In: Comput. Intell. 38(2), pp. 667-689, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yidong Chai, Yonghang Zhou, Weifeng Li 0002, Yuanchun Jiang |
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(2), pp. 790-803, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rohit Valecha, Pranali Mandaokar, H. Raghav Rao |
Phishing Email Detection Using Persuasion Cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(2), pp. 747-756, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Matthew L. Jensen, Ryan T. Wright, Alexandra Durcikova, Shamya Karumbaiah |
Improving Phishing Reporting Using Security Gamification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 39(3), pp. 793-823, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | M. Satheesh Kumar, K. G. Srinivasagan 0001, G. UnniKrishnan |
A lightweight and proactive rule-based incremental construction approach to detect phishing scam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Technol. Manag. ![In: Inf. Technol. Manag. 23(4), pp. 271-298, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nafiz Rifat, Mostofa Ahsan, Md Minhaz Chowdhury, Rahul Gomes |
BERT Against Social Engineering Attack: Phishing Text Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8009-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jibrilla Tanimu, Stavros Shiaeles |
Phishing Detection Using Machine Learning Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022, pp. 317-322, 2022, IEEE, 978-1-6654-9952-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Tarini Saka, Kami Vaniea, Nadin Kökciyan |
Context-Based Clustering to Mitigate Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022, pp. 115-126, 2022, ACM, 978-1-4503-9880-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim |
Phishing URL Detection: A Network-based Approach Robust to Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 1769-1782, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3165-3179, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Pablo López-Aguilar, Constantinos Patsakis, Agusti Solanas |
The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022, pp. 1-10, 2022, IEEE, 979-8-3503-0169-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Bhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef |
Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022, pp. 1-13, 2022, IEEE, 979-8-3503-0169-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sirui Zhang, Zhiwei Yan, Kejun Dong, Hongtao Li, Xuebiao Yuchi |
Phishing Domain Name Detection Based on Hierarchical Fusion of Multimodal Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSE ![In: 16th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2022, Wuhan, China, December 9-11, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-6523-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mirjana Pejic-Bach, Ivan Jajic, Tanja Kamenjarska |
A Bibliometric Analysis of Phishing in the Big Data Era: High Focus on Algorithms and Low Focus on People. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CENTERIS/ProjMAN/HCist ![In: CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist - International Conference on Health and Social Care Information Systems and Technologies 2022, Hybrid Event / Lisbon, Portugal, November 9-11, 2022., pp. 91-98, 2022, Elsevier. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Fatima Zahra Qachfar, Rakesh M. Verma, Arjun Mukherjee |
Leveraging Synthetic Data and PU Learning For Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, pp. 29-40, 2022, ACM, 978-1-4503-9220-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alima Nzeket Njoya, Franklin Tchakounté, Marcellin Atemkeng, Kalum Priyanath Udagepola, Didier Bassolé |
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICOMM ![In: Towards new e-Infrastructure and e-Services for Developing Countries - 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings, pp. 430-445, 2022, Springer, 978-3-031-34895-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nguyen Bac Trinh, The Duy Phan, Van-Hau Pham |
Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoICT ![In: The 11th International Symposium on Information and Communication Technology, SoICT 2022, Hanoi, Vietnam, December 1-3, 2022, pp. 134-141, 2022, ACM, 978-1-4503-9725-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mukta Mithra Raj, J. Angel Arul Jothi |
Website Phishing Detection Using Machine Learning Classification Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAI ![In: Applied Informatics: 5th International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, Proceedings, pp. 219-233, 2022, Springer International Publishing, 978-3-031-19647-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rufai Ahmad, Sotirios Terzis |
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAISA ![In: Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings, pp. 197-206, 2022, Springer, 978-3-031-12171-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Thea K. Mannix, Gregor Petric, Anita-Catrin Eriksen, Jacopo Paglia, Kai Roer |
Phishing Susceptibility Across Industries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Augmented Cognition - 16th International Conference, AC 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, pp. 69-79, 2022, Springer, 978-3-031-05456-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Vivek Sharma, Tzipora Halevi |
A Survey on Phishing Website Detection Using Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (49) ![In: HCI International 2022 - Late Breaking Posters - 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part II, pp. 684-694, 2022, Springer, 978-3-031-19681-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mahmoud Atari, Amjed Al-Mousa |
A Machine-Learning Based Approach for Detecting Phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDSTA ![In: 3rd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2022, San Antonio, TX, USA, September 5-7, 2022, pp. 82-88, 2022, IEEE, 978-1-6654-9960-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yuanyi Sun, Sencun Zhu, Yan Zhao, Pengfei Sun |
A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 10th IEEE Conference on Communications and Network Security, CNS 2022, Austin, TX, USA, October 3-5, 2022, pp. 91-99, 2022, IEEE, 978-1-6654-6255-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Debalina Bera, Dan J. Kim 0001 |
The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 28th Americas Conference on Information Systems, AMCIS 2022, Minneapolis, MN, USA, August 10-14, 2022, 2022, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Xincheng Duan, Biwei Yan, Anming Dong, Li Zhang 0122, Jiguo Yu |
Phishing Frauds Detection Based on Graph Neural Network on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA (1) ![In: Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part I, pp. 351-363, 2022, Springer, 978-3-031-19207-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Abdulrahman Almutairi, Abdullah I. Alshoshan |
Developing a Webpage Phishing Attack Detection Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAI (3) ![In: Intelligent Computing - Proceedings of the 2022 Computing Conference, Volume 3, SAI 2022, Virtual Event, 14-15 July 2022., pp. 693-709, 2022, Springer, 978-3-031-10466-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Wesam Fadheel, Wassnaa Al-Mawee, Steve Carr 0001 |
On Phishing: URL Lexical and Network Traffic Features Analysis and Knowledge Extraction using Machine Learning Algorithms (A Comparison Study). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSIT ![In: 5th International Conference on Data Science and Information Technology, DSIT 2022, Shanghai, China, July 22-24, 2022, pp. 1-7, 2022, IEEE, 978-1-6654-9868-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed Fahad Alghenaim, Nur Azaliah Abu Bakar, Fiza Abdul Rahim, Vanye Zira Vanduhe, Gamal Alkawsi 0001 |
Phishing Attack Types and Mitigation: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaSET ![In: Data Science and Emerging Technologies - Proceedings of DaSET 2022, Virtual Event, 20-21 December, 2022., pp. 131-153, 2022, Springer, 978-981-99-0740-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shehan Vidyakeerthi, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama |
Demo: PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25 - 29, 2022, pp. 286-289, 2022, ACM, 978-1-4503-9130-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sijia Li, Gaopeng Gou, Chang Liu 0049, Chengshang Hou, Zhenzhen Li, Gang Xiong 0001 |
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022, pp. 661-669, 2022, ACM, 978-1-4503-9096-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Holly Rosser, Maylene Mayor, Adam Stemmler, Vinod Kumar Ahuja, Andrea Grover, Matthew Hale |
Phish Finders: Crowd-powered RE for anti-phishing training tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE Workshops ![In: 30th IEEE International Requirements Engineering Conference Workshops, RE 2022 - Workshops, Melbourne, Australia, August 15-19, 2022, pp. 130-135, 2022, IEEE, 978-1-6654-6000-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shih-Chun Lin, Pang-Cheng Wl, Hong-Yen Chen, Tomohiro Morikawa, Takeshi Takahashi 0001, Tsung-Nan Lin |
SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2022, Seoul, Korea, May 16-20, 2022, pp. 4180-4186, 2022, IEEE, 978-1-5386-8347-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alex Sumner, Jinsheng Xu, Xiaohong Yuan |
Determining Phishing Emails using URL Domain Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIC ![In: 1st International Conference on AI in Cybersecurity, ICAIC 2022, Victoria, TX, USA, May 24-26, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-0043-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rajeev Kumar Shah, Mohammad Kamrul Hasan, Shayla Islam, Asif Khan 0007, Taher M. Ghazal, Ahmad Neyaz Khan |
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIC ![In: 1st International Conference on AI in Cybersecurity, ICAIC 2022, Victoria, TX, USA, May 24-26, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-0043-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001 |
What Should Abeeha do? an Activity for Phishing Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS Companion ![In: 22nd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2022 - Companion, Guangzhou, China, December 5-9, 2022, pp. 756-757, 2022, IEEE, 979-8-3503-1991-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Vincent Drury, Luisa Lux, Ulrike Meyer |
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 14:1-14:11, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Tristan Bilot, Grégoire Geis, Badis Hammi |
PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022., pp. 428-435, 2022, SCITEPRESS, 978-989-758-590-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Wenhan Hou, Bo Cui, Ru Li 0004 |
Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional Random Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/DSS/SmartCity/DependSys ![In: 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022, pp. 1495-1500, 2022, IEEE, 979-8-3503-1993-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Arpit Singh, Subhas C. Misra |
A Comparison of Performance of Rough Set Theory with Machine Learning Techniques in Detecting Phishing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Honoring Professor Mohammad S. Obaidat ![In: Advances in Computing, Informatics, Networking and Cybersecurity - A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions, pp. 631-650, 2022, Springer, 978-3-030-87048-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut |
Phishing Kits Source Code Similarity Distribution: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, Honolulu, HI, USA, March 15-18, 2022, pp. 983-994, 2022, IEEE, 978-1-6654-3786-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Birendra Jha, Medha Atre, Ashwini Rao |
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPS-ISA ![In: 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022, Atlanta, GA, USA, December 14-17, 2022, pp. 130-139, 2022, IEEE, 978-1-6654-7408-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Daiki Ito, Yuta Takata, Masaki Kamizono |
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPS-ISA ![In: 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022, Atlanta, GA, USA, December 14-17, 2022, pp. 97-106, 2022, IEEE, 978-1-6654-7408-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shuaicong Yu, Changqing An, Tao Yu, Ziyi Zhao, Tianshu Li, Jilong Wang 0001 |
Phishing Detection Based on Multi-Feature Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: IEEE International Performance, Computing, and Communications Conference, IPCCC 2022, Austin, TX, USA, November 11-13, 2022, pp. 73-79, 2022, IEEE, 978-1-6654-8018-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Md. Abu Ashraf Siddiq, Mohammad Arifuzzaman, M. S. Islam |
Phishing Website Detection using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCA ![In: ICCA 2022: 2nd International Conference on Computing Advancements, Dhaka, Bangladesh, March 10 - 12, 2022, pp. 83-88, 2022, ACM, 978-1-4503-9734-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lilly Kassner, Avo Schönbohm |
A Serious Game to Improve Phishing Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GALA ![In: Games and Learning Alliance: 11th International Conference, GALA 2022, Tampere, Finland, November 30 - December 2, 2022, Proceedings, pp. 109-117, 2022, Springer International Publishing, 978-3-031-22124-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 2033 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|