A survey of phishing attack techniques, defence mechanisms and open research challenges
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A survey of phishing attack techniques, defence mechanisms and open research challenges
Authors
Keywords
-
Journal
Enterprise Information Systems
Volume -, Issue -, Pages 1-39
Publisher
Informa UK Limited
Online
2021-03-16
DOI
10.1080/17517575.2021.1896786
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Blockchain-based authentication and authorization for smart city applications
- (2020) Christian Esposito et al. INFORMATION PROCESSING & MANAGEMENT
- A Keyword-based Combination Approach for Detecting Phishing Webpages
- (2019) Yan Ding et al. COMPUTERS & SECURITY
- A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
- (2019) Kang Leng Chiew et al. INFORMATION SCIENCES
- Jail-Phish: An improved search engine based phishing detection system
- (2019) Routhu Srinivasa Rao et al. COMPUTERS & SECURITY
- Mobile phishing attacks and defence mechanisms: State of art and open research challenges
- (2018) Diksha Goel et al. COMPUTERS & SECURITY
- A survey of phishing attacks: Their types, vectors and technical approaches
- (2018) Kang Leng Chiew et al. EXPERT SYSTEMS WITH APPLICATIONS
- Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
- (2018) Aakanksha Tewari et al. Future Generation Computer Systems-The International Journal of eScience
- A machine learning based approach for phishing detection using hyperlinks information
- (2018) Ankit Kumar Jain et al. Journal of Ambient Intelligence and Humanized Computing
- Machine Learning Based Phishing Detection from URLs
- (2018) Ozgur Koray Sahingoz et al. EXPERT SYSTEMS WITH APPLICATIONS
- Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
- (2017) Samuel Marchal et al. IEEE TRANSACTIONS ON COMPUTERS
- Detecting Mobile Malicious Webpages in Real Time
- (2017) Chaitrali Amrutkar et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
- (2017) Chuying Yu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Phishing Detection: Analysis of Visual Similarity Based Approaches
- (2017) Ankit Kumar Jain et al. Security and Communication Networks
- Defending against phishing attacks: taxonomy of methods, current issues and future directions
- (2017) B. B. Gupta et al. TELECOMMUNICATION SYSTEMS
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing
- (2017) Jae Woong Joo et al. TELECOMMUNICATION SYSTEMS
- Two-level authentication approach to protect from phishing attacks in real time
- (2017) Ankit Kumar Jain et al. Journal of Ambient Intelligence and Humanized Computing
- A phish detector using lightweight search features
- (2016) Gaurav Varshney et al. COMPUTERS & SECURITY
- PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
- (2016) Choon Lin Tan et al. DECISION SUPPORT SYSTEMS
- New rule-based phishing detection method
- (2016) Mahmood Moghimi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms
- (2016) Longfei Wu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Tree edit distance: Robust and memory-efficient
- (2016) Mateusz Pawlik et al. INFORMATION SYSTEMS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- A minimum enclosing ball-based support vector machine approach for detection of phishing websites
- (2016) Yuancheng Li et al. OPTIK
- A survey and classification of web phishing detection schemes
- (2016) Gaurav Varshney et al. Security and Communication Networks
- Two-stage ELM for phishing Web pages detection using hybrid features
- (2016) Wei Zhang et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system
- (2015) Gholam Ali Montazer et al. APPLIED SOFT COMPUTING
- Utilisation of website logo for phishing detection
- (2015) Kang Leng Chiew et al. COMPUTERS & SECURITY
- An efficacious method for detecting phishing webpages through target domain identification
- (2014) Gowtham Ramesh et al. DECISION SUPPORT SYSTEMS
- Intelligent rule-based phishing websites classification
- (2014) Rami M. Mohammad et al. IET Information Security
- Feature set identification for detecting suspicious URLs using Bayesian classification in social networks
- (2014) Chia-Mei Chen et al. INFORMATION SCIENCES
- PhishStorm: Detecting Phishing With Streaming Analytics
- (2014) Samuel Marchal et al. IEEE Transactions on Network and Service Management
- A comprehensive and efficacious architecture for detecting phishing webpages
- (2013) R. Gowtham et al. COMPUTERS & SECURITY
- A Survey of Phishing Email Filtering Techniques
- (2013) Ammar Almomani et al. IEEE Communications Surveys and Tutorials
- Predicting phishing websites based on self-structuring neural network
- (2013) Rami M. Mohammad et al. NEURAL COMPUTING & APPLICATIONS
- From keyloggers to touchloggers: Take the rough with the smooth
- (2012) D. Damopoulos et al. COMPUTERS & SECURITY
- Using automated individual white-list to protect web digital identities
- (2012) Weili Han et al. EXPERT SYSTEMS WITH APPLICATIONS
- CANTINA+
- (2011) Guang Xiang et al. ACM Transactions on Information and System Security
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
- (2011) H. Kim et al. ELECTRONICS LETTERS
- An efficient phishing webpage detector
- (2011) Mingxing He et al. EXPERT SYSTEMS WITH APPLICATIONS
- Security Education against Phishing: A Modest Proposal for a Major Rethink
- (2011) Iacovos Kirlappos et al. IEEE SECURITY & PRIVACY
- Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach
- (2011) Haijun Zhang et al. IEEE TRANSACTIONS ON NEURAL NETWORKS
- Detecting visually similar Web pages
- (2010) Teh-Chung Chen et al. ACM Transactions on Internet Technology
- Intelligent phishing detection system for e-banking using fuzzy data mining
- (2010) Maher Aburrous et al. EXPERT SYSTEMS WITH APPLICATIONS
- Discovering phishing target based on semantic link network
- (2009) Liu Wenyin et al. Future Generation Computer Systems-The International Journal of eScience
- Fighting Phishing with Discriminative Keypoint Features
- (2009) Kuan-Ta Chen et al. IEEE INTERNET COMPUTING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now