2015
DOI: 10.1007/978-3-319-24584-3_36
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Client-Side Toolbars as a User-Oriented Anti-Phishing Solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…This is also shown in Tab. 6 where we see that features from f 2 and f 3 have the lowest average weight. On the other hand, features form f 4 and f 5 have the highest impact on classification with an average weight of 0.0084 and 0.0139 per feature respectively.…”
Section: Feature Analysismentioning
confidence: 92%
See 1 more Smart Citation
“…This is also shown in Tab. 6 where we see that features from f 2 and f 3 have the lowest average weight. On the other hand, features form f 4 and f 5 have the highest impact on classification with an average weight of 0.0084 and 0.0139 per feature respectively.…”
Section: Feature Analysismentioning
confidence: 92%
“…In addition, users must share their browsing history with these centralized services thereby compromising their privacy. These concerns are partially addressed by real-time client-side solutions, but existing clientside solutions typically have low detection accuracy [6].…”
Section: Introductionmentioning
confidence: 99%
“…Detection of phishing website using C4.5 Data mining algorithm [18].In this paper analysis of C4.5 (J48) data mining algorithm was implemented through WEKA tool. The two Anti-phishing techniques which were used are [19]. 1.…”
Section: IImentioning
confidence: 99%
“…There were around 300 websites for testing among them 200 were phishing websites 154 which were predicted as phishing and amongst 100 legitimate 94 were detected. The success rate was obtained to be 0.826 with an error of 0.173 and the accuracy which was trained with 750 instances was found to be 82.6%.Different systems in heuristic based approach such as PhishZoo [22], PhishNet and LinkGuard [19] were proposed to detect phishing websites. Phishing websites classification using Association classification (PWCAC) [23].In this research new algorithm was created named PWCAC Phishing website classification using association classification for the detection of phishing websites.…”
Section: Learning Phase 2 Prediction Phasementioning
confidence: 99%
“…Blacklist and whitelist techniques have also been employed to no avail, because attackers keep on changing mobile numbers every now and then. Furthermore, blacklist and whitelist datasets are incapable of detecting zero-hour attacks and quickly become overpopulated and obsolete [26]. User awareness programs on security good practice have not produced the desired results and are unlikely to reduce this vulnerability to zero [27].…”
Section: Introductionmentioning
confidence: 99%