

Ĭao, Y., Han, W., Le, Y.: Anti-phishing based on automated individual white-list. Kim, Y.-G., Cho, S., Lee, J.-S., Lee, M.-S., Kim, I.H., Kim, S.H.: Method for evaluating the security risk of a website against phishing attacks. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. Wu, M., Miller, R.C., Little, G.: Web wallet: preventing phishing attacks by revealing user intentions. In: International Conference on Computing, Management and Telecommunications (ComManTel), pp. Nguyen, L.A.T., To, B.L., Nguyen, H.K., Nguyen, M.H.: A novel approach for phishing detection using URL-based heuristic. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. (TISSEC) 16, 16 (2014)Ĭhou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-side defense against web-based identity theft. 189–196 (2014)Ĭhen, T.-C., Stepan, T., Dick, S., Miller, J.: An anti-phishing system employing diffused information. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. Zhou, Y., Zhang, Y., Xiao, J., Wang, Y., Lin, W.: Visual similarity based anti-phishing with the combination of local and global features. Liu, W., Deng, X., Huang, G., Fu, A.Y.: An antiphishing strategy based on visual similarity assessment. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. Rosiello, A.P., Kirda, E., Ferrandi, F.: A layout-similarity-based approach for detecting phishing pages. ACM, Banff (2007)Ĭhen, T.-C., Dick, S., Miller, J.: Detecting visually similar web pages: application to phishing detection. In: Proceedings of the 16th International Conference on World Wide Web, pp. Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC 2009, pp. Ma, L., Ofoghi, B., Watters, P., Brown, S.: Detecting phishing emails using hybrid features. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. Hamid, I.R.A., Abawajy, J.: Hybrid feature selection for phishing email detection.
Mypublisher phishing software#
In: 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, pp. Yu, W.D., Nargundkar, S., Tiruthani, N.: PhishCatch - a phishing detection tool. Herzberg, A.: DNS-based email sender authentication mechanisms: a critical review. In: eCrime Researchers Summit, eCRIME 2009, pp.

Toolan, F., Carthy, J.: Phishing detection using classifier ensembles.

In: CEAS: First Conference on Email and Anti-Spam (2004)įette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. Rigoutsos, I., Huynh, T.: Chung-Kwei: a pattern-discovery-based system for the automatic identification of unsolicited E-mail messages (SPAM). In: New York State Cyber Security Conference (2006) 18, 7–35 (2010)Ĭhandrasekaran, M., Karayanan, K., Upadhyaya, S.: Towards phishing e-mail detection based on their structural properties. ACM, Edinburgh (2006)īergholz, A., De Beer, J., Glahn, S., Moens, M.-F., Paaß, G., Strobel, S.: New filtering approaches for phishing email. In: Proceedings of the 15th International Conference on World Wide Web, pp. Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. Lynch, J.: Identity theft in cyberspace: crime control methods and their effectiveness in combating phishing attacks. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. Zhuang, W., Jiang, Q., Xiong, T.: An intelligent anti-phishing strategy model for phishing website detection. Tayade, P.C., Wadhe, A.P.: Review paper on privacy preservation through phishing email filter. Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. Harrison, B., Vishwanath, A., Rao, R.: A user-centered approach to phishing susceptibility: the role of a suspicious personality in protecting against phishing. Li, S., Schmitz, R.: A novel anti-phishing framework based on honeypots. In: International Conference on IT Convergence and Security (ICITCS), pp. Chang, E.H., Chiew, K.L., Sze, S.N., Tiong, W.K.: Phishing detection via identification of website identity.
