A survey of phishing attack techniques, defence mechanisms and open research challenges
出版年份 2021 全文链接
标题
A survey of phishing attack techniques, defence mechanisms and open research challenges
作者
关键词
-
出版物
Enterprise Information Systems
Volume -, Issue -, Pages 1-39
出版商
Informa UK Limited
发表日期
2021-03-16
DOI
10.1080/17517575.2021.1896786
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Blockchain-based authentication and authorization for smart city applications
- (2020) Christian Esposito et al. INFORMATION PROCESSING & MANAGEMENT
- A Keyword-based Combination Approach for Detecting Phishing Webpages
- (2019) Yan Ding et al. COMPUTERS & SECURITY
- A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
- (2019) Kang Leng Chiew et al. INFORMATION SCIENCES
- Jail-Phish: An improved search engine based phishing detection system
- (2019) Routhu Srinivasa Rao et al. COMPUTERS & SECURITY
- Mobile phishing attacks and defence mechanisms: State of art and open research challenges
- (2018) Diksha Goel et al. COMPUTERS & SECURITY
- A survey of phishing attacks: Their types, vectors and technical approaches
- (2018) Kang Leng Chiew et al. EXPERT SYSTEMS WITH APPLICATIONS
- Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
- (2018) Aakanksha Tewari et al. Future Generation Computer Systems-The International Journal of eScience
- A machine learning based approach for phishing detection using hyperlinks information
- (2018) Ankit Kumar Jain et al. Journal of Ambient Intelligence and Humanized Computing
- Machine Learning Based Phishing Detection from URLs
- (2018) Ozgur Koray Sahingoz et al. EXPERT SYSTEMS WITH APPLICATIONS
- Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
- (2017) Samuel Marchal et al. IEEE TRANSACTIONS ON COMPUTERS
- Detecting Mobile Malicious Webpages in Real Time
- (2017) Chaitrali Amrutkar et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
- (2017) Chuying Yu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Phishing Detection: Analysis of Visual Similarity Based Approaches
- (2017) Ankit Kumar Jain et al. Security and Communication Networks
- Defending against phishing attacks: taxonomy of methods, current issues and future directions
- (2017) B. B. Gupta et al. TELECOMMUNICATION SYSTEMS
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing
- (2017) Jae Woong Joo et al. TELECOMMUNICATION SYSTEMS
- Two-level authentication approach to protect from phishing attacks in real time
- (2017) Ankit Kumar Jain et al. Journal of Ambient Intelligence and Humanized Computing
- A phish detector using lightweight search features
- (2016) Gaurav Varshney et al. COMPUTERS & SECURITY
- PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
- (2016) Choon Lin Tan et al. DECISION SUPPORT SYSTEMS
- New rule-based phishing detection method
- (2016) Mahmood Moghimi et al. EXPERT SYSTEMS WITH APPLICATIONS
- Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms
- (2016) Longfei Wu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Tree edit distance: Robust and memory-efficient
- (2016) Mateusz Pawlik et al. INFORMATION SYSTEMS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- A minimum enclosing ball-based support vector machine approach for detection of phishing websites
- (2016) Yuancheng Li et al. OPTIK
- A survey and classification of web phishing detection schemes
- (2016) Gaurav Varshney et al. Security and Communication Networks
- Two-stage ELM for phishing Web pages detection using hybrid features
- (2016) Wei Zhang et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system
- (2015) Gholam Ali Montazer et al. APPLIED SOFT COMPUTING
- Utilisation of website logo for phishing detection
- (2015) Kang Leng Chiew et al. COMPUTERS & SECURITY
- An efficacious method for detecting phishing webpages through target domain identification
- (2014) Gowtham Ramesh et al. DECISION SUPPORT SYSTEMS
- Intelligent rule-based phishing websites classification
- (2014) Rami M. Mohammad et al. IET Information Security
- Feature set identification for detecting suspicious URLs using Bayesian classification in social networks
- (2014) Chia-Mei Chen et al. INFORMATION SCIENCES
- PhishStorm: Detecting Phishing With Streaming Analytics
- (2014) Samuel Marchal et al. IEEE Transactions on Network and Service Management
- A comprehensive and efficacious architecture for detecting phishing webpages
- (2013) R. Gowtham et al. COMPUTERS & SECURITY
- A Survey of Phishing Email Filtering Techniques
- (2013) Ammar Almomani et al. IEEE Communications Surveys and Tutorials
- Predicting phishing websites based on self-structuring neural network
- (2013) Rami M. Mohammad et al. NEURAL COMPUTING & APPLICATIONS
- From keyloggers to touchloggers: Take the rough with the smooth
- (2012) D. Damopoulos et al. COMPUTERS & SECURITY
- Using automated individual white-list to protect web digital identities
- (2012) Weili Han et al. EXPERT SYSTEMS WITH APPLICATIONS
- CANTINA+
- (2011) Guang Xiang et al. ACM Transactions on Information and System Security
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
- (2011) H. Kim et al. ELECTRONICS LETTERS
- An efficient phishing webpage detector
- (2011) Mingxing He et al. EXPERT SYSTEMS WITH APPLICATIONS
- Security Education against Phishing: A Modest Proposal for a Major Rethink
- (2011) Iacovos Kirlappos et al. IEEE SECURITY & PRIVACY
- Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach
- (2011) Haijun Zhang et al. IEEE TRANSACTIONS ON NEURAL NETWORKS
- Detecting visually similar Web pages
- (2010) Teh-Chung Chen et al. ACM Transactions on Internet Technology
- Intelligent phishing detection system for e-banking using fuzzy data mining
- (2010) Maher Aburrous et al. EXPERT SYSTEMS WITH APPLICATIONS
- Discovering phishing target based on semantic link network
- (2009) Liu Wenyin et al. Future Generation Computer Systems-The International Journal of eScience
- Fighting Phishing with Discriminative Keypoint Features
- (2009) Kuan-Ta Chen et al. IEEE INTERNET COMPUTING
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now