2013
DOI: 10.1016/j.jnca.2012.05.009
|View full text |Cite
|
Sign up to set email alerts
|

A multi-tier phishing detection and filtering approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
84
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 102 publications
(84 citation statements)
references
References 31 publications
(77 reference statements)
0
84
0
Order By: Relevance
“…The system proposed by Guo et al [5] assessed the severity of phishing attacks in terms of the risk levels and the potential loss in market value suffered by the targeted firms. The supervised classification techniques are used, which is a major stream of data mining, to assess the severity of phishing attacks.…”
Section: Assessing the Severity Of Phishing Attacks: A Hybrid Data MImentioning
confidence: 99%
See 1 more Smart Citation
“…The system proposed by Guo et al [5] assessed the severity of phishing attacks in terms of the risk levels and the potential loss in market value suffered by the targeted firms. The supervised classification techniques are used, which is a major stream of data mining, to assess the severity of phishing attacks.…”
Section: Assessing the Severity Of Phishing Attacks: A Hybrid Data MImentioning
confidence: 99%
“…At the same time, the key antecedents that contribute to a high risk level or a high financial loss generation by a phishing attack are identified. Guo et al [5] used a hybrid approach which combines key phrase extraction and supervised classification methods that make use of the textual data description of the phishing attack with the financial data of the targeted company to assess the severity of a phishing attack according to its risk level or financial loss generating potential. The neural network (NN), decision tree (DT), and support vector machine (SVM) are used to classify the risk levels.…”
Section: Assessing the Severity Of Phishing Attacks: A Hybrid Data MImentioning
confidence: 99%
“…Islam and Abawajy [22] propose a multi-tier phishing detection and filtering approach for phishing email filtering. They also propose a method for extracting the features of phishing email based on weighting of message content and message header and select the features according to priority ranking.…”
Section: Related Workmentioning
confidence: 99%
“…According to Islam and Abawajy [22], "phishing attacks continue to pose serious risks for consumers and businesses as well as threatening global security and the economy". This calls for the development of effective countermeasures against email-born phishing attacks in order to safeguard critical infrastructures such as banking Phishing is a type of semantic attack in which victims are sent emails that deceive them into providing sensitive information such as account numbers, passwords, or other personal to phisher.…”
Section: Introductionmentioning
confidence: 99%
“…From study we proposed a method for Online Fraud Transaction prevention using EVC and QR code techniques. R. Islam et al (2013) [8] proposed a new approach called multi-tier classification model for phishing email filtering. They also propose an innovative method for extracting the features of phishing email based on weighting of message content and message header and select the features according to priority ranking.…”
Section: Introductionmentioning
confidence: 99%