A Review on Phishing—Machine Vision and Learning Approaches

[1]  M. Alamgir Hossain,et al.  Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text , 2019, Expert Syst. Appl..

[2]  Fadi A. Thabtah,et al.  Phishing detection based Associative Classification data mining , 2014, Expert Syst. Appl..

[3]  Harry Wechsler,et al.  Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation , 2013, Comput. Secur..

[4]  Niels Provos,et al.  All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.

[5]  Young Min Baek,et al.  My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns , 2014, Comput. Hum. Behav..

[6]  R. Rahman,et al.  Effectiveness of Fraud Prevention and Detection Techniques in Malaysian Islamic Banks , 2014 .

[7]  Michalis Faloutsos,et al.  PhishDef: URL names say it all , 2010, 2011 Proceedings IEEE INFOCOM.

[8]  Chuanxiong Guo Online Detection and Prevention of Phishing Attacks (Invited Paper) , 2006 .

[9]  Yang Xiao,et al.  Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing , 2008, Comput. Commun..

[10]  Max-Emanuel Maurer,et al.  Using visual website similarity for phishing detection and reporting , 2012, CHI Extended Abstracts.

[11]  Rui Chen,et al.  Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..

[12]  Bart De Decker,et al.  User-centric identity management using trusted modules , 2013, Math. Comput. Model..

[13]  Malcolm Robert Pattinson,et al.  The design of phishing studies: Challenges for researchers , 2015, Comput. Secur..

[14]  Mohammad Zulkernine,et al.  Trustworthiness testing of phishing websites: A behavior model-based approach , 2012, Future Gener. Comput. Syst..

[15]  Christopher B Mayhorn,et al.  Special issue on warnings: advances in delivery, application, and methods. , 2014, Applied ergonomics.

[16]  Steven Furnell,et al.  Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..

[17]  Robert H. Deng,et al.  Leakage-resilient password entry: Challenges, design, and evaluation , 2015, Comput. Secur..

[18]  Mingxing He,et al.  An efficient phishing webpage detector , 2011, Expert Syst. Appl..

[19]  Jemal H. Abawajy,et al.  An approach for profiling phishing activities , 2014, Comput. Secur..

[20]  Robert LaRose,et al.  Online safety begins with you and me: Convincing Internet users to protect themselves , 2015, Comput. Hum. Behav..

[21]  Yuancheng Li,et al.  A semi-supervised learning approach for detection of phishing webpages , 2013 .

[22]  Elizabeth Sillence,et al.  It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..

[23]  M. S. Vijaya,et al.  Efficient prediction of phishing websites using supervised learning algorithms , 2012 .

[24]  Rachel Greenstadt,et al.  PhishZoo: Detecting Phishing Websites by Looking at Them , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.

[25]  Ilango Krishnamurthi,et al.  A comprehensive and efficacious architecture for detecting phishing webpages , 2014, Comput. Secur..

[26]  Ioannis Mavridis,et al.  Information infrastructure risk prediction through platform vulnerability analysis , 2015, J. Syst. Softw..

[27]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[28]  Stefano Taddei,et al.  Surfing on Social Network Sites: A comprehensive instrument to evaluate online self-disclosure and related attitudes , 2015, Comput. Hum. Behav..

[29]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[30]  Steve Love,et al.  A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..

[31]  Indranil Bose,et al.  The impact of adoption of identity theft countermeasures on firm value , 2013, Decis. Support Syst..

[32]  Fatemeh Zahedi,et al.  Trust violation and repair: The information privacy perspective , 2015, Decis. Support Syst..

[33]  Stefano Zanero,et al.  BankSealer: A decision support system for online banking fraud analysis and investigation , 2015, Comput. Secur..

[34]  KarydaMaria,et al.  Analyzing the role of cognitive and cultural biases in the internalization of information security policies , 2015 .

[35]  Mamoun Alazab,et al.  Profiling and classifying the behavior of malicious codes , 2015, J. Syst. Softw..

[36]  Fadi A. Thabtah,et al.  Intelligent phishing detection system for e-banking using fuzzy data mining , 2010, Expert Syst. Appl..

[37]  Swapna Kolimi,et al.  Reducing online identity disclosure using warnings. , 2014, Applied ergonomics.

[38]  Syed Taqi Ali,et al.  A Computer Vision Technique to Detect Phishing Attacks , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[39]  Aggeliki Tsohou,et al.  Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs , 2015, Comput. Secur..

[40]  Amir Herzberg Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..

[41]  Sushil K. Sharma,et al.  Understanding Member Use of Social Networking Sites from a Risk Perspective , 2013 .

[42]  ParsonsKathryn,et al.  The design of phishing studies , 2015 .

[43]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[44]  BansalGaurav,et al.  Trust violation and repair , 2015 .

[45]  Stefan Fenz,et al.  Toward web-based information security knowledge sharing , 2013, Inf. Secur. Tech. Rep..

[46]  Oliver Popov,et al.  Semantic Representation and Integration of Digital Evidence , 2013, KES.

[47]  Xi Chen,et al.  Assessing the severity of phishing attacks: A hybrid data mining approach , 2011, Decis. Support Syst..

[48]  Hassan B. Kazemian,et al.  Comparisons of machine learning techniques for detecting malicious webpages , 2015, Expert Syst. Appl..

[49]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[50]  Abdul Ghafoor Abbasi,et al.  Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.

[51]  Chechen Liao,et al.  Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model , 2011, Electron. Commer. Res. Appl..

[52]  Xiaotie Deng,et al.  Detection of phishing webpages based on visual similarity , 2005, WWW '05.

[53]  Sonia Chiasson,et al.  Why phishing still works: User strategies for combating phishing attacks , 2015, Int. J. Hum. Comput. Stud..

[54]  Yixin Zhang,et al.  Age, gender, and Internet attitudes among employees in the business world , 2005, Comput. Hum. Behav..

[55]  Dimitris Gritzalis,et al.  Security Busters: Web browser security vs. rogue sites , 2015, Comput. Secur..

[56]  Ronald C. Dodge,et al.  Phishing for user security awareness , 2007, Comput. Secur..

[57]  Zhijun Yan,et al.  A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites , 2014, Inf. Manag..

[58]  Nauman Aslam,et al.  Intelligent phishing detection and protection scheme for online transactions , 2013, Expert Syst. Appl..

[59]  Ebru Akcapinar Sezer,et al.  Use of HOG descriptors in phishing detection , 2016, 2016 4th International Symposium on Digital Forensic and Security (ISDFS).

[60]  P. Trivellas,et al.  Risk Reduction Strategies in Online Shopping: E-trust Perspective , 2014 .

[61]  Joshua Ojo Nehinbe,et al.  Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders , 2013, EUSPN/ICTH.

[62]  Chun-Ying Huang,et al.  Using one-time passwords to prevent password phishing attacks , 2011, J. Netw. Comput. Appl..

[63]  Jung-Hyun Lee,et al.  A study of the security of Internet banking and financial private information in South Korea , 2013, Math. Comput. Model..

[64]  Carolyn Penstein Rosé,et al.  CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.

[65]  ChiassonSonia,et al.  Why phishing still works , 2015 .

[66]  Răzvan Rughiniş,et al.  Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union , 2014, Comput. Secur..

[67]  Vadlamani Ravi,et al.  Soft computing based imputation and hybrid data and text mining: The case of predicting the severity of phishing alerts , 2012, Expert Syst. Appl..

[68]  Alwyn Roshan Pais,et al.  Jail-Phish: An improved search engine based phishing detection system , 2019, Comput. Secur..

[69]  T. L. McCluskey,et al.  Tutorial and critical analysis of phishing websites methods , 2015, Comput. Sci. Rev..

[70]  Ilango Krishnamurthi,et al.  An efficacious method for detecting phishing webpages through target domain identification , 2014, Decis. Support Syst..

[71]  Chee Kheong Siew,et al.  Can threshold networks be trained directly? , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.

[72]  R. Nigel Horspool,et al.  A framework for metamorphic malware analysis and real-time detection , 2015, Comput. Secur..

[73]  Xin Luo,et al.  Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration , 2013, Comput. Secur..

[74]  Graham Greenleaf,et al.  South Korea's innovations in data privacy principles: Asian comparisons , 2014, Comput. Law Secur. Rev..

[75]  Dahui Li,et al.  Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..

[76]  Gang Liu,et al.  Discovering phishing target based on semantic link network , 2010 .

[77]  Michel Walrave,et al.  You've got mail! Explaining individual differences in becoming a phishing target , 2018, Telematics Informatics.

[78]  Wen-Hsi Chang,et al.  Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters , 2014, Electron. Commer. Res. Appl..

[79]  Mohammad Abdollahi Azgomi,et al.  Mean privacy: A metric for security of computer systems , 2014, Comput. Commun..

[80]  Philip W. L. Fong,et al.  Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems , 2014, Comput. Secur..

[81]  F.C. Dalgic,et al.  Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors , 2018, 2018 2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).

[82]  Alberto Guillén,et al.  Analysing user trust in electronic banking using data mining methods , 2013, Expert Syst. Appl..

[83]  Kun Li,et al.  BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[84]  Elisa Bertino,et al.  Using automated individual white-list to protect web digital identities , 2012, Expert Syst. Appl..

[85]  Kuan-Ta Chen,et al.  Fighting Phishing with Discriminative Keypoint Features , 2009, IEEE Internet Computing.

[86]  Mohamed G. Gouda,et al.  SPP: An anti-phishing single password protocol , 2007, Comput. Networks.

[87]  Kang-Leng Chiew,et al.  Utilisation of website logo for phishing detection , 2015, Comput. Secur..

[88]  Neda Abdelhamid,et al.  Multi-label rules for phishing classification , 2015 .

[89]  Indranil Bose,et al.  Assessing anti-phishing preparedness: A study of online banks in Hong Kong , 2008, Decis. Support Syst..