نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

Journal: :International journal of innovative technology and exploring engineering 2022

A web service is one of the most important Internet communications software services. Using fraudulent methods to get personal information becoming increasingly widespread these days. However, it makes our lives easier, leads numerous security vulnerabilities Internet’s private structure. Web phishing just many risks that services face. Phishing assaults are usually detected by experienced user...

2015
Doaa Hassan Ram B. Basnet Andrew H. Sung Gerhard Paa Frank Reichartz Siehyun Strobel Aaron Blum Brad Wardman Thamar Solorio Weibo Chu Bin B. Zhu Feng Xue Xiaohong Guan Ian Fette Norman Sadeh Mark Hall Eibe Frank Geoffrey Holmes Bernhard Pfahringer Peter Reutemann Ian H. Witten

Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user 's confidential information such as usernames, passwords and credit card information. Recently machine learning and data mining techniques have been a promising approach for detection of phishing websites by distinguishing between phishing and legitimate ones. The detection process in this approa...

2017
V. M. Thakare

— Pattern classification is a branch of machine learning that focuses on recognition of patterns and regularities in data. In adversarial applications like biometric authentication, spam filtering, network intrusion detection the pattern classification systems are used. Extending pattern classification theory and design methods to adversarial environment is thus a novel and very relevant resear...

2009
Sadia Afroz Rachel Greenstadt

Phishing is a web-based attack that uses social engineering techniques to exploit Internet users and acquire sensitive data. Most phishing attacks work by creating a fake version of the real site’s web interface to gain the user’s trust. Despite the fact that these phishing sites look identical or nearly identical to the real sites they imitate, user studies have shown that users ignore browser...

2008
Begona Perez-Mira

Over 29,000 phishing emails are reported each month on average to the AntiPhishing Working Group. If we consider that at least 5% of these emails achieve their target, at least 1,450 distinct email users a month are caught in the phisher’s net. This study attempts to understand the basic deception techniques utilized by phishers when creating the phishing emails. Exploratory content and linguis...

2015
Rajendra Gupta Piyush Kumar Shukla Rajiv Gandhi

The phishing is a kind of e-commerce lure which is intended to steal the confidential information of the internet user by making identical website of legitimate one in which the contents and images most likely remains similar to the legitimate website. The other way of phishing website is to do minor changes in the URL or in the domain of the website. In this paper, an anti-phishing system is p...

2009
Tyler Moore Richard Clayton

To implement a phishing scam, attackers must create a fake website and send spam to attract visitors. To date, empirical research into phishing’s impact has studied either the spam being sent or the website lifetimes. In this paper, we examine both phishing websites and the associated spam to gauge the overall effectiveness of phishing attack and defense. We find that while the bulk of spam is ...

Journal: :Information & Management 2021

Phishing websites become a critical cybersecurity threat affecting individuals and organizations. Phishing-website detection tools are designed to protect users against such sites. Nevertheless, face serious user trust suboptimal performance issues which require calibration align with the tool’s capabilities. We employ theoretical framework of automation reliance as kernel theory develop model ...

Journal: :International Journal of Computer Applications 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید