SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder

CL Tan, KL Chiew, KS Wong - Decision Support Systems, 2016 - Elsevier
This paper proposes a phishing detection technique based on the difference between the
target and actual identities of a webpage. The proposed phishing detection approach, called …

Using case-based reasoning for phishing detection

HYA Abutair, A Belghith - Procedia Computer Science, 2017 - Elsevier
Many classifications techniques have been used and devised to combat phishing threats,
but none of them is able to efficiently identify web phishing attacks due to the continuous …

Online corporate communications: website usability and content

M García García, MV Carrillo-Durán… - Journal of …, 2017 - emerald.com
Purpose The purpose of this paper is to establish a categorization of corporate websites as
tools of online communication, in accordance with how they apply usability to the content …

Detecting phishing websites using automation of human behavior

R Srinivasa Rao, AR Pais - Proceedings of the 3rd ACM workshop on …, 2017 - dl.acm.org
In this paper, we propose a technique to detect phishing attacks based on behavior of
human when exposed to fake website. Some online users submit fake credentials to the …

An efficient phishing attack detection using machine learning algorithms

P Chinnasamy, N Kumaresan… - … on Advancements in …, 2022 - ieeexplore.ieee.org
Phishing is an illegal method which involves user's personal information at high risk.
Phishing websites prey individuals, the cloud storage hosting companies and government …

Intelligent methods for accurately detecting phishing websites

A Abuzuraiq, M Alkasassbeh… - 2020 11th International …, 2020 - ieeexplore.ieee.org
With increasing technology developments, there is a massive number of websites with
varying purposes. But a particular type exists within this large collection, the so-called …

CBR-PDS: a case-based reasoning phishing detection system

H Abutair, A Belghith, S AlAhmadi - Journal of Ambient Intelligence and …, 2019 - Springer
Phishing attacks have become the preferred vehicle to gather sensitive information as well
as to deliver dangerous malware. So far, there is still no phishing detection system that can …

PhishStack: evaluation of stacked generalization in phishing URLs detection

SSMM Rahman, T Islam, MI Jabiullah - Procedia Computer Science, 2020 - Elsevier
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …

Email phishing detection and prevention by using data mining techniques

Ş Şentürk, E Yerli, İ Soğukpınar - … International Conference on …, 2017 - ieeexplore.ieee.org
Social engineering has emerged as a serious threat in virtual communities and is an
important means to attack information systems. The services used by today's knowledge …