暂无分享,去创建一个
Belal Amro | Ahmed Abu Sabha | Ammar Qunaibi | Ibraheem Najjar | Belal M. Amro | Ammar Qunaibi | Ibraheem Najjar
[1] Chun-Ying Huang,et al. Mitigate web phishing using site signatures , 2010, TENCON 2010 - 2010 IEEE Region 10 Conference.
[2] Kun Li,et al. BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[3] Ankit Kumar Jain,et al. Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.
[4] Abdulghani Ali Ahmed,et al. Real time detection of phishing websites , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[5] Ramana Rao Kompella,et al. PhishNet: Predictive Blacklisting to Detect Phishing Attacks , 2010, 2010 Proceedings IEEE INFOCOM.
[6] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[7] Akira Yamada,et al. Visual similarity-based phishing detection without victim site information , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[8] Ankit Kumar Jain,et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list , 2016, EURASIP Journal on Information Security.
[9] Belal Amro,et al. Phishing Techniques in Mobile Devices , 2018, ArXiv.
[10] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[11] B. B. Gupta,et al. A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.
[12] Ilango Krishnamurthi,et al. An efficacious method for detecting phishing webpages through target domain identification , 2014, Decis. Support Syst..
[13] Hicham Tout,et al. Phishpin: An Identity-Based Anti-phishing Approach , 2009, 2009 International Conference on Computational Science and Engineering.
[14] Stephen Groat,et al. GoldPhish: Using Images for Content-Based Phishing Analysis , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[15] Rachel Greenstadt,et al. PhishZoo: Detecting Phishing Websites by Looking at Them , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.
[16] T Soumya.. Phishing Attack Techniques , 2017 .
[17] Tommy W. S. Chow,et al. Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach , 2011, IEEE Transactions on Neural Networks.
[18] Fadi A. Thabtah,et al. Phishing detection based Associative Classification data mining , 2014, Expert Syst. Appl..
[19] T. Balamuralikrishna,et al. Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching , 2012 .