International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012) 2012
DOI: 10.1109/icprime.2012.6208390
|View full text |Cite
|
Sign up to set email alerts
|

Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…First, the offender sends a communication to the target, which 62 of the definitions state. Typically, the offender sends the target an email (n = 30) or sends a message using a method that is not specified (n = 22), occasionally using other methods such as websites (Hodgson 2005;Levy 2004;Olurin et al 2012), social spaces (Piper 2007), instant messages (Ali and Rajamani 2012;Verma et al 2012), text messaging (Hinson 2010) or even letters (Workman 2008). Then, the target may reply by sending information to the offender, which is mentioned in 64 of the definitions, mostly through the use of a website (n = 40).…”
Section: Resultsmentioning
confidence: 99%
“…First, the offender sends a communication to the target, which 62 of the definitions state. Typically, the offender sends the target an email (n = 30) or sends a message using a method that is not specified (n = 22), occasionally using other methods such as websites (Hodgson 2005;Levy 2004;Olurin et al 2012), social spaces (Piper 2007), instant messages (Ali and Rajamani 2012;Verma et al 2012), text messaging (Hinson 2010) or even letters (Workman 2008). Then, the target may reply by sending information to the offender, which is mentioned in 64 of the definitions, mostly through the use of a website (n = 40).…”
Section: Resultsmentioning
confidence: 99%
“…It is worth noticing that data mining techniques have been adopted in this context, to prevent phishing variants. Ali and Rajamani (2012) adopted association rule mining algorithm for detection of deceptive phishing from instant messages. The model predicted phishing threats for text and audio messages effectively.…”
Section: Related Workmentioning
confidence: 99%
“…Mahmood Ali M. et.al. [19] presented a paper on 'Deceptive Phishing Detection System (From Audio and Text messages in Instant Messengers using Data Mining Approach)' in which, words are recognized from speech with the help of FFT spectrum analysis and LPC coefficients methodologies.…”
Section: Overview Of Previous Study On Phishingmentioning
confidence: 99%