Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Aws Naser Jaber, Lothar Fritsch, Hårek Haugerud |
Improving Phishing Detection with the Grey Wolf Optimizer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIC ![In: International Conference on Electronics, Information, and Communication, ICEIC 2022, Jeju, Korea, Republic of, February 6-9, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-0934-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ruofan Liu, Yun Lin 0001, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong |
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 1633-1650, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Ammar Dawabsheh, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui, Segun I. Popoola |
An Enhanced Phishing Detection Tool Using Deep Learning From URL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartNets ![In: International Conference on Smart Applications, Communications and Networking, SmartNets 2022, Palapye, Botswana, November 29 - Dec. 1, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8758-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang |
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SciSec ![In: Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers, pp. 522-538, 2022, Springer, 978-3-031-17550-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Andriana Magdalinou, Athena Kalokairinou, Flora Malamateniou, John Mantas |
The Development and Evaluation of an Anti-Phishing E-Learning Intervention for Nurses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EFMI-STC ![In: Digital Professionalism in Health and Care: Developing the Workforce, Building the Future - Proceedings of the EFMI Special Topic Conference, EFMI-STC 2022, Cardiff, Wales, UK, 7- 8 September 2022., pp. 165-166, 2022, IOS Press, 978-1-64368-310-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dikka Aditya Satria Wibawa, Hermawan Setiawan, Girinoto |
Anti-Phishing Game Framework Based on Extended Design Play Experience (DPE) Framework as an Educational Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBIS ![In: 7th International Workshop on Big Data and Information Security, IWBIS 2022, Depok, Indonesia, October 1-3, 2022, pp. 107-112, 2022, IEEE, 978-1-6654-8950-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Girinoto, Dimas Febriyan Priambodo, Tiyas Yulita, R. K. Adek Muhammad Zulkham, A. Fathurrahman Rifqi, A. Shakira Putri |
OmeTV Pretexting Phishing Attacks: A Case Study of Social Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBIS ![In: 7th International Workshop on Big Data and Information Security, IWBIS 2022, Depok, Indonesia, October 1-3, 2022, pp. 119-124, 2022, IEEE, 978-1-6654-8950-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, Yao-Chung Fan |
Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 17th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2022), Tirana, Albania, 27-29 October 2022., pp. 270-281, 2022, Springer, 978-3-031-20028-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Pavlo Burda, Luca Allodi, Nicola Zannone |
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers, pp. 443-452, 2022, Springer, 978-3-031-30121-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | A. Kovac, Ivan Dunder, Sanja Seljan |
An overview of machine learning algorithms for detecting phishing attacks on electronic messaging services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPRO ![In: 45th Jubilee International Convention on Information, Communication and Electronic Technology, MIPRO 2022, Opatija, Croatia, May 23-27, 2022, pp. 954-961, 2022, IEEE, 978-953-233-103-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jiachen Wang |
An Improved Genetic Algorithm for Web Phishing Detection Feature Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CACML ![In: Asia Conference on Algorithms, Computing and Machine Learning, CACML 2011, Hangzhou, China, March 25-27, 2022, pp. 130-134, 2022, IEEE, 978-1-6654-8290-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Serhii Buchyk, Dmytro Shutenko, Serhii Toliupa |
Phishing Attacks Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT&I Workshops ![In: Selected Papers of the IX International Scientific Conference `Information Technology and Implementation` (IT&I-2022), Workshop Proceedings, Kyiv, Ukraine, November 30 - December 02, 2022., pp. 193-201, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone |
RAIDER: Reinforcement-Aided Spear Phishing Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings, pp. 23-50, 2022, Springer, 978-3-031-23019-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Joongyum Kim, Jihwan Kim, Seongil Wi, Yongdae Kim, Sooel Son |
HearMeOut: detecting voice phishing activities in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022 - 1 July 2022, pp. 422-435, 2022, ACM, 978-1-4503-9185-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Matthew James Werner, Kennedy Njenga |
Phishing Attack Victims and the Effect on Work Engagement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDIA ![In: Digital-for-Development: Enabling Transformation, Inclusion and Sustainability Through ICTs - 12th International Development Informatics Association Conference, IDIA 2022, Mbombela, South Africa, November 22-25, 2022, Revised Selected Papers, pp. 203-217, 2022, Springer, 978-3-031-28471-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | May Almousa, Ruben Furst, Mohd Anwar |
Characterizing Coding Style of Phishing Websites Using Machine Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TransAI ![In: Fourth International Conference on Transdisciplinary AI, TransAI 2022, Laguna Hills, CA, USA, September 19-21, 2022, pp. 101-105, 2022, IEEE, 978-1-6654-7184-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yuwei Sun, Ng S. T. Chong, Hideya Ochiai |
Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022, Prague, Czech Republic, October 9-12, 2022, pp. 20-25, 2022, IEEE, 978-1-6654-5258-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo |
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 446-459, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jinghao Li, Hexiao Li, Na Cheng, Wuqing Zhang, Ya Xu, Hengyang Zhang, Jianbin Li |
Multi-channel Walk Embedding Based Ethereum Phishing Scam Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 28th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2022, Nanjing, China, January 10-12, 2023, pp. 289-295, 2022, IEEE, 978-1-6654-7315-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Manish Bhurtel, Yuba Raj Siwakoti, Danda B. Rawat |
Phishing Attack Detection with ML-Based Siamese Empowered ORB Logo Recognition and IP Mapper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops, INFOCOM 2022 - Workshops, New York, NY, USA, May 2-5, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-0926-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Anna Maria Vegni, Marica Amadeo |
LearnPhi: a Real-Time Learning Model for Early Prediction of Phishing Attacks in IoV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022, pp. 252-255, 2022, IEEE, 978-1-6654-3161-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Bhupendra Acharya, Phani Vadrevu |
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings, pp. 156-177, 2022, Springer, 978-3-031-09483-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sarah Y. Zheng, Ingolf Becker |
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS @ USENIX Security Symposium ![In: Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022., pp. 253-271, 2022, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Bimal Karki, Faranak Abri, Akbar Siami Namin, Keith S. Jones |
Using Transformers for Identification of Persuasion Principles in Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022, pp. 2841-2848, 2022, IEEE, 978-1-6654-8045-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Amir Kashapov, Tingmin Wu, Sharif Abuadbba, Carsten Rudolph |
Email Summarization to Assist Users in Phishing Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 1234-1236, 2022, ACM, 978-1-4503-9140-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Michael Koddebusch |
Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: dg.o 2022: The 23rd Annual International Conference on Digital Government Research, Virtual Event, Republic of Korea, June 15 - 17, 2022, pp. 78-87, 2022, ACM, 978-1-4503-9749-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mariya Shmalko, Alsharif Abuadbba, Raj Gaire 0001, Tingmin Wu, Hye-Young Paik, Surya Nepal |
Profiler: Distributed Model to Detect Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022, pp. 1336-1337, 2022, IEEE, 978-1-6654-7177-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Emanuele Galdi, Gaetano Perrone, Simon Pietro Romano |
ThePhish: an Automated Open-Source Phishing Email Analysis Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), Rome, Italy, June 20-23, 2022., pp. 76-101, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Leonardo Ranaldi, Michele Petito, Marco Gerardi, Francesca Fallucchid, Fabio Massimo Zanzotto |
Machine Learning Techniques for Italian Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), Rome, Italy, June 20-23, 2022., pp. 181-194, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Tianhao Xu, Kuldeep Singh 0005, Prashanth Rajivan |
Modeling Phishing Decision using Instance Based Learning and Natural Language Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 55th Hawaii International Conference on System Sciences, HICSS 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022, pp. 1-10, 2022, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Ingvar Tjøstheim |
Phishing, Data-Disclosure and The Cognitive Reflection Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 55th Hawaii International Conference on System Sciences, HICSS 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022, pp. 1-10, 2022, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Jun Yong Yoon, Bong Jun Choi 0001 |
Privacy-Friendly Phishing Attack Detection Using Personalized Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHI ![In: Intelligent Human Computer Interaction - 14th International Conference, IHCI 2022, Tashkent, Uzbekistan, October 20-22, 2022, Revised Selected Papers, pp. 460-465, 2022, Springer, 978-3-031-27198-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sajad Homayoun, Kaspar Hageman, Sam Afzal-Houshmand, Christian Damsgaard Jensen, Jens Myrup Pedersen |
Detecting Ambiguous Phishing Certificates using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: International Conference on Information Networking, ICOIN 2022, Jeju-si, Republic of Korea, January 12-15, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-1332-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | D. Nanthiya, S. B. Gopal, C. Poongodi, K. Jegadeesh, P. Narendraprasath, J. Jeevanandham |
Autoencoder Based Feature Selection for Phishing URL Attack Detection in IoT Using Stacked Autoencoder (AFS-SAE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, Kharagpur, India, October 3-5, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-5262-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | M. Amir Syafiq Rohmat Rose, Nurlida Basir, Nur Fatin Nabila Rafie Heng, Nurzi Juana Mohd Zaizi, Madihah Mohd Saudi |
Phishing Detection and Prevention using Chrome Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDFS ![In: 10th International Symposium on Digital Forensics and Security, ISDFS 2022, Istanbul, Turkey, June 6-7, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-9796-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Habiba Bouijij, Amine Berqia, Hamadou Saliah-Hassane |
Phishing URL classification using Extra-Tree and DNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDFS ![In: 10th International Symposium on Digital Forensics and Security, ISDFS 2022, Istanbul, Turkey, June 6-7, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-9796-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lucas Candeia Teixeira, Júlio César Gomes De Barros, Bruno José Torres Fernandes, Carlo Marcelo Revoredo da Silva |
CatchPhish: Model for detecting homographic attacks on phishing pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2022, Padua, Italy, July 18-23, 2022, pp. 1-8, 2022, IEEE, 978-1-7281-8671-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Daniele Lain, Kari Kostiainen, Srdjan Capkun |
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, pp. 842-859, 2022, IEEE, 978-1-6654-1316-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi, Ismail Keshta |
Efficient Email phishing detection using Machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 12th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2022, Las Vegas, NV, USA, January 26-29, 2022, pp. 354-358, 2022, IEEE, 978-1-6654-8303-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mustafa Al-Fayoumi, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh, Rana Abdulraheem |
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 12th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2022, Las Vegas, NV, USA, January 26-29, 2022, pp. 7-11, 2022, IEEE, 978-1-6654-8303-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Eric Chan-Tin, Loretta Stalans, Spencer Johnston, Daisy Reyes, Shelia Kennison |
Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNTA@HPDC ![In: SNTA@HPDC 2022, Fifth International Workshop on Systems and Network Telemetry and Analytics, Minneapolis, MN, USA, 30 June 2022, pp. 35-42, 2022, ACM, 978-1-4503-9315-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Filipo Sharevski, Amy Devine, Emma Pieroni, Peter Jachim |
Phishing with Malicious QR Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29 - 30, 2022, pp. 160-171, 2022, ACM, 978-1-4503-9700-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Suseta Datta, Shibaprasad Sen, Pritam Kundu |
A Trustworthy Swift Weapon to Detect the Phishing URLs by Machine Learning Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: Proceedings of the Workshop on Computer Networks and Communications (WCNC 2022) Co-located with TOOTILL 100 - International Conference on Computing Sciences (ICCS 2022), Chennai, India, April 22-24, 2022 (Later changed to Online due to COVID-19 Pandemic)., pp. 39-46, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra |
SAFER: Social Capital-Based Friend Recommendation to Defend against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWSM ![In: Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, ICWSM 2022, Atlanta, Georgia, USA, June 6-9, 2022, pp. 241-252, 2022, AAAI Press, 978-1-57735-875-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | P. Ponni, D. Prabha |
Randomized Active Learning to Identify Phishing URL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACIS ![In: Advanced Communication and Intelligent Systems - First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers, pp. 533-539, 2022, Springer, 978-3-031-25087-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Eint Sandi Aung, Hayato Yamana |
Hybrid Phishing URL Detection Using Segmented Word Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: Information Integration and Web Intelligence - 24th International Conference, iiWAS 2022, Virtual Event, November 28-30, 2022, Proceedings, pp. 507-518, 2022, Springer, 978-3-031-21046-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alexey Gusev |
Domestic private banking solutions can be quite successful as an effective protection against whaling-style cyber attacks which are used as a basis for more complex targeted phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BICA*AI ![In: Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, BICA*AI 2022, 13th Annual Meeting of the BICA Society, September 22-24, 2022, Guadalajara, Mexico., pp. 391-399, 2022, Elsevier. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Giovanni Apruzzese, Mauro Conti, Ying Yuan |
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022, pp. 171-185, 2022, ACM, 978-1-4503-9759-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lucas Torrealba Aravena, Javier Bustos-Jiménez, Pedro Casas |
PHISHWEB: a progressive, multi-layered system for phishing websites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMC ![In: Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25-27, 2022, pp. 764-765, 2022, ACM, 978-1-4503-9259-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Karthika Subramani, William Melicher, Oleksii Starov, Phani Vadrevu, Roberto Perdisci |
PhishInPatterns: measuring elicited user interactions at scale on phishing websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMC ![In: Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25-27, 2022, pp. 589-604, 2022, ACM, 978-1-4503-9259-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEDU (2) ![In: Proceedings of the 14th International Conference on Computer Supported Education, CSEDU 2022, Online Streaming, April 22-24, 2022, Volume 2., pp. 458-466, 2022, SCITEPRESS, 978-989-758-562-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Megha Sharma, Mayank Kumar, Cleotilde Gonzalez, Varun Dutt |
How the Presence of Cognitive Biases in Phishing Emails Affects Human Decision-Making? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (5) ![In: Neural Information Processing - 29th International Conference, ICONIP 2022, Virtual Event, November 22-26, 2022, Proceedings, Part V, pp. 550-560, 2022, Springer, 978-981-99-1641-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Panpan Li, Yunyi Xie, Xinyao Xu, Jiajun Zhou, Qi Xuan |
Phishing Fraud Detection on Ethereum Using Graph Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BlockSys ![In: Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers, pp. 362-375, 2022, Springer, 978-981-19-8042-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Dennis Roellke |
Detection, Triage, and Attribution of PII Phishing Sites ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
DOI RDF |
|
12 | Mustafa Aydin |
Sahte internet sitelerinin URL özellikleri temelinde tespit edilmesi amacıyla özellik seçme metotlarının ve öğrenme algoritmalarının analizi (Analysis of feature selection methods and learning algorithms for phishing websites detection based on URL) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
12 | Thomas Nagunwa |
Fast detection of zero-day phishing websites using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
12 | Routhu Srinivasa Rao, Alwyn Roshan Pais, Pritam Anand |
A heuristic technique to detect phishing websites using TWSVM classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 33(11), pp. 5733-5752, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Mengli Wang, Lipeng Song |
Efficient defense strategy against spam and phishing email: An evolutionary game model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 61, pp. 102947, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Liqun Yang, Jiawei Zhang, Xiaozhe Wang, Zhi Li 0045, Zhoujun Li 0001, Yueying He |
An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 165, pp. 113863, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Martin Steinebach, Sascha Zenglein, Katharina Brandl |
Phishing detection on tor hidden services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 36 Supplement, pp. 301117, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Lizhen Tang, Qusay H. Mahmoud |
A Survey of Machine Learning-Based Solutions for Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. Knowl. Extr. ![In: Mach. Learn. Knowl. Extr. 3(3), pp. 672-694, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Tom McVey |
Analysing three new complex phishing tactics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2021(6), pp. 6, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Hamidreza Shahbaznezhad, Farzan Kolini, Mona Rashidirad |
Employees' Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 61(6), pp. 539-550, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Andrei Butnaru, Alexios Mylonas, Nikolaos Pitropakis |
Towards Lightweight URL-Based Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(6), pp. 154, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Huanhuan Wang, Debin Cheng, Hui Peng |
Phishing website detection method based on CNAIR framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Priv. Secur. Integr. ![In: Int. J. Inf. Priv. Secur. Integr. 5(1), pp. 18-35, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Anjuli Franz, Alexander Benlian |
Erratum zu: Spear Phishing 2.0: Wie automatisierte Angriffe Organisationen vor neue Herausforderungen stellen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HMD Prax. Wirtsch. ![In: HMD Prax. Wirtsch. 58(5), pp. 1286-1287, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Fu Song, Yusi Lei, Sen Chen 0001, Lingling Fan 0003, Yang Liu 0003 |
Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 36(9), pp. 5210-5240, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Yuji Sakurai, Takuya Watanabe 0001, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori |
Identifying the Phishing Websites Using the Patterns of TLS Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 10(2), pp. 451-486, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Raniyah Wazirali, Rami Ahmad, Ashraf Abdel-Karim Helal Abu-Ein |
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 201, pp. 108591, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | M. Sathish Kumar, B. Indrani |
Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Iran J. Comput. Sci. ![In: Iran J. Comput. Sci. 4(2), pp. 85-93, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Bandar Alotaibi, Munif Alotaibi |
Consensus and majority vote feature selection methods and a detection technique for web phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 12(1), pp. 717-727, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, Dongkyoo Shin |
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 80866-80872, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Pubudu L. Indrasiri, Malka N. Halgamuge, Azeem Mohammad |
Robust Ensemble Machine Learning Model for Filtering Phishing URLs: Expandable Random Gradient Stacked Voting Classifier (ERG-SVC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 150142-150161, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Wilayat Khan, Aakash Ahmad, Aamir Qamar, Muhammad Kamran, Muhammad Altaf |
SpoofCatch: A Client-Side Protection Tool Against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 23(2), pp. 65-74, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Kholoud Althobaiti, Adam D. G. Jenkins, Kami Vaniea |
A Case Study of Phishing Incident Response in an Educational Organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 5(CSCW2), pp. 338:1-338:32, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Etuari Oram, Pandit Byomakesha Dash, Bighnaraj Naik, Janmenjoy Nayak, S. Vimal 0001, Sathees Kumar Nataraj |
Light gradient boosting machine-based phishing webpage detection model using phisher website features of mimic URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 152, pp. 100-106, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Brij B. Gupta, Krishna Yadav, Imran Razzak, Konstantinos E. Psannis, Arcangelo Castiglione, Xiaojun Chang |
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 175, pp. 47-57, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Falah Hassan Al-akashi |
Analysing Twitter Data for Phishing Tweets Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Inf. Technol. ![In: Int. J. Intell. Inf. Technol. 17(2), pp. 96-106, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Dirk Fox, Christian Titze |
Phishing Awareness durch Gamification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 45(11), pp. 727-732, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Dirk Fox |
Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 45(11), pp. 717, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Ariane Lambert-Mogiliansky, Adrian Calmettes |
Phishing for (Quantum-Like) Phools - Theory and Experimental Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(2), pp. 162, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Akash Sundararaj, Gökhan Kul |
Impact Analysis of Training Data Characteristics for Phishing Email Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2), pp. 85-98, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Franklin Tchakounté, Virgile Simé Nyassi, Duplex Elvis Houpa Danga, Kalum Priyanath Udagepola, Marcellin Atemkeng |
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Scalable Inf. Syst. ![In: EAI Endorsed Trans. Scalable Inf. Syst. 8(30), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Yuosuf Al-Hamar, Hoshang Kolivand, Mostafa Tajdini, Tanzila Saba, Varatharajan Ramachandran |
Enterprise Credential Spear-phishing attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 94, pp. 107363, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Shweta Sankhwar, Dhirendra Pandey, Raees Ahmad Khan, Sachi Nandan Mohanty |
An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 4(1), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Humza Ahmad, Laszlo Erdodi |
Overview of phishing landscape and homographs in Arabic domain names. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 4(4), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Christopher Nguyen, Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright |
A comparison of features in a crowdsourced phishing warning system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. J. ![In: Inf. Syst. J. 31(3), pp. 473-513, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Sameena Naaz |
Detection of Phishing in Internet of Things Using Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 13(2), pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Amit Singh, Abhishek Tiwari 0007 |
A Study of Feature Selection and Dimensionality Reduction Methods for Classification-Based Phishing Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Retr. Res. ![In: Int. J. Inf. Retr. Res. 11(1), pp. 1-35, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | L. Lakshmi, M. Purushotham Reddy, Chukka Santhaiah, U. Janardhan Reddy |
Smart Phishing Detection in Web Pages using Supervised Deep Learning Classification and Optimization Technique ADAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 118(4), pp. 3549-3564, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Malek Alzaqebah, Sana Jawarneh, Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh |
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 13(1), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Yan Chen 0016, Fatemeh Mariam Zahedi, Ahmed Abbasi, David G. Dobolyi |
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 58(1), pp. 103394, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong 0002 |
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.10176, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Mohit Singhal, Nihal Kumarswamy, Shreyasi Kinhekar, Shirin Nilizadeh |
The Prevalence of Cybersecurity Misinformation on Social Media: Case Studies on Phishing Reports and Zoom's Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.12296, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Sohail Ahmed Khan, Wasiq Khan, Abir Hussain |
Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2101.02552, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | P. Kalaharsha, Babu M. Mehtre |
Detecting Phishing Sites - An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.12739, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Daniele Lain, Kari Kostiainen, Srdjan Capkun |
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.07498, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar 0001 |
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.04766, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Yuwei Sun, Ng S. T. Chong, Hideya Ochiai |
Privacy-Preserving Phishing Email Detection Based on Federated Learning and LSTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.06025, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh |
Evaluating the effectiveness of Phishing Reports on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.07201, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|