نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

Journal: :Human-centric Computing and Information Sciences 2016

2016
Urvashi Prajapati Neha Sangal Deepti Patole

Phishing attack is used to steal confidential information of user. Fraud websites appear similar to genuine websites with the logo and graphics of trusted website. Fraud Website Detection application aims to detect fraud websites using data mining techniques. This project provides intelligent solution to phishing attack. W3C standard defines characteristics which can be used to distinguish frau...

Journal: :JNW 2009
Chenfeng Vincent Zhou Christopher Leckie Shanika Karunasekera

Phishing is a significant security threat to users of Internet services. Nowadays, phishing has become more resilient to detection and trace-back with the invention of Fast Flux (FF) service networks. We propose two approaches to correlate evidence from multiple DNS servers and multiple suspect FF domains. Real-world experiments show that our correlation approaches speed-up FF domain detection,...

2009
Lorrie Cranor Yue Zhang Brad Wardman Gary Warner Chengshan Zhang Ponnurangam Kumaraguru Serge Egelman Justin Crenshaw Kami Vaniea Patrick Kelley Janice Tsai Rob Reeder Xiangchen Sheng

Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick people into giving up personal information. This thesis looks at the phishing problem holistically by examining various stakeholders and their countermeasures, and by surveying experts’ opinions about the current and future threats and the kinds of countermeasures that should be put in place. It...

Journal: :Processes 2022

Phishing is one of the biggest crimes in world and involves theft user’s sensitive data. Usually, phishing websites target individuals’ websites, organizations, sites for cloud storage, government websites. Most users, while surfing internet, are unaware attacks. Many existing approaches have failed providing a useful way to issues facing e-mails Currently, hardware-based used face software Due...

2016
Masoumeh Zareapoor

Dimensionality reduction is generally performed when high dimensional data like text are classified. This can be done either by using feature extraction techniques or by using feature selection techniques. This paper analyses which dimension reduction technique is better for classifying text data like emails. Email classification is difficult due to its high dimensional sparse features that aff...

2017
Ahmed Nafies Okasha Mohamed Olaf Manuel Maennel Raimundas Matulevicius

Phishing is a nontrivial problem involving deceptive emails and webpages that trick unsuspecting users into willingly revealing their confidential information. In this paper, we focus on detecting login phishing pages, pages that contain forms with email and password fields to allow for authorization to personal/restricted content. We present the design, implementation, and evaluation of our ph...

Journal: :International Journal of Grid and Distributed Computing 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید