Results 211 to 220 of about 28,722 (249)
Some of the next articles are maybe not open access.
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites
2017 IEEE International Conference on Information Reuse and Integration (IRI), 2017Denizens of the Internet are coming under a barrage of phishing attacks of increasing frequency and sophistication. Emails accompanied by authentic looking websites are ensnaring users who, unwittingly, hand over their credentials compromising both their privacy and security.
Hossein Shirazi +2 more
openaire +1 more source
Proactive Phishing Sites Detection
IEEE/WIC/ACM International Conference on Web Intelligence, 2019Phishing is one of the social engineering techniques to steal users’ sensitive information by disguising a fake Web site as a trustworthy one. Previous research proposed phishing mitigation techniques, such as blacklist, heuristics, visual similarity, and machine learning.
Akihito Nakamura, Fuma Dobashi
openaire +1 more source
Cue Utilization, Phishing Feature and Phishing Email Detection
2020Cognitive processes are broadly considered to be of vital importance to understanding phishing email feature detection or misidentification. This research extends the current literature by introducing the concept of cue utilization as a unique predictor of phishing feature detection.
Piers Bayl-Smith +2 more
openaire +1 more source
Email Embeddings for Phishing Detection
2020 IEEE International Conference on Big Data (Big Data), 2020The problem of detecting phishing emails through machine learning techniques has been discussed extensively in the literature. Conventional and state-of-the-art machine learning algorithms have demonstrated the possibility of building classifiers with high accuracy.
Luis Felipe Gutiérrez +4 more
openaire +1 more source
Automatic Detection of Phishing Target from Phishing Webpage
2010 20th International Conference on Pattern Recognition, 2010An approach to identification of the phishing target of a given (suspicious) webpage is proposed by clustering the webpage set consisting of its all associated webpages and the given webpage itself. We first find its associated webpages, and then explore their relationships to the given webpage as their features for clustering.
Gang Liu 0008, Bite Qiu, Liu Wenyin
openaire +1 more source
Ontological Detection of Phishing Emails
2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2018Detection of phishing emails is a topic that received a lot of attention both from academia and industry due to the devastating effects of phishing enabled data breaches have on private individual and companies. While the accuracy of phishing detection reported in the papers is impressive, the damage from the attacks continues to grow every year.
Gilchan Park, Julia Rayz
openaire +1 more source
Deep Learning for Phishing Detection
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), 2018Phishing attacks have caused significant damage to society. With the popularity of two-dimensional codes, a new type of phishing method called two-dimensional code phishing attacks has been created, which targets mobile users. In recent years, with the popularity of mobile devices, the threat of this new type of phishing attack is increasing, and may ...
Wenbin Yao +2 more
openaire +1 more source
PhishCatch - A Phishing Detection Tool
2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact of phishing is drastic and significant since it can involve the risk of identity theft and financial losses.
Weider D. Yu +2 more
openaire +1 more source
UI-Dressing to Detect Phishing
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014Phishing has been and still is a prevalent attack causing serious damage to numerous ingenuous Internet users every year. Usable security is understood as one required pillar for developing effective protection means in this context. We therefore survey and discuss on available usable security mechanisms against phishing.
Luigi Lo Iacono +4 more
openaire +1 more source
Detection of Phishing Websites
2023Phishing attacks are one of the biggest security threats to personal and financial information on the internet. They are a type of cyber-attack where attackers pretend to be a trusted entity in order to trick people into revealing sensitive information, such as passwords and credit card numbers.
Lakshmipathi Gejjala +3 more
openaire +1 more source

