- Home
- Publications
- Publication Search
- Publication Details
Title
Phishing Detection: Analysis of Visual Similarity Based Approaches
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 2017, Issue -, Pages 1-20
Publisher
Hindawi Limited
Online
2017-01-11
DOI
10.1155/2017/5421046
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- New rule-based phishing detection method
- (2016) Mahmood Moghimi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system
- (2015) Gholam Ali Montazer et al. APPLIED SOFT COMPUTING
- The design of phishing studies: Challenges for researchers
- (2015) Kathryn Parsons et al. COMPUTERS & SECURITY
- Utilisation of website logo for phishing detection
- (2015) Kang Leng Chiew et al. COMPUTERS & SECURITY
- Incremental learning for ν-Support Vector Regression
- (2015) Bin Gu et al. NEURAL NETWORKS
- Incremental Support Vector Learning for Ordinal Regression
- (2015) Bin Gu et al. IEEE Transactions on Neural Networks and Learning Systems
- An efficacious method for detecting phishing webpages through target domain identification
- (2014) Gowtham Ramesh et al. DECISION SUPPORT SYSTEMS
- Intelligent phishing detection and protection scheme for online transactions
- (2013) P.A. Barraclough et al. EXPERT SYSTEMS WITH APPLICATIONS
- A Survey of Phishing Email Filtering Techniques
- (2013) Ammar Almomani et al. IEEE Communications Surveys and Tutorials
- Phishing Detection: A Literature Survey
- (2013) Mahmoud Khonji et al. IEEE Communications Surveys and Tutorials
- Using automated individual white-list to protect web digital identities
- (2012) Weili Han et al. EXPERT SYSTEMS WITH APPLICATIONS
- A multi-tier phishing detection and filtering approach
- (2012) Rafiqul Islam et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Consumer trust in e-commerce web sites
- (2011) Patricia Beatty et al. ACM COMPUTING SURVEYS
- CANTINA+
- (2011) Guang Xiang et al. ACM Transactions on Information and System Security
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Assessment of E-Commerce security using AHP and evidential reasoning
- (2011) Yajuan Zhang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach
- (2011) Haijun Zhang et al. IEEE TRANSACTIONS ON NEURAL NETWORKS
- Detecting visually similar Web pages
- (2010) Teh-Chung Chen et al. ACM Transactions on Internet Technology
- Data mining for credit card fraud: A comparative study
- (2010) Siddhartha Bhattacharyya et al. DECISION SUPPORT SYSTEMS
- Assessing the severity of phishing attacks: A hybrid data mining approach
- (2010) Xi Chen et al. DECISION SUPPORT SYSTEMS
- Intelligent phishing detection system for e-banking using fuzzy data mining
- (2010) Maher Aburrous et al. EXPERT SYSTEMS WITH APPLICATIONS
- The dark side of the Internet: Attacks, costs and responses
- (2010) Won Kim et al. INFORMATION SYSTEMS
- Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies
- (2010) Maher Aburrous et al. Cognitive Computation
- Fighting Phishing with Discriminative Keypoint Features
- (2009) Kuan-Ta Chen et al. IEEE INTERNET COMPUTING
- Contrast context histogram—An efficient discriminating local descriptor for object recognition and image matching
- (2008) Chun-Rong Huang et al. PATTERN RECOGNITION
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now