2014
DOI: 10.1007/s10766-014-0330-9
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Forwarding-Based Malicious URLs in Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(32 citation statements)
references
References 9 publications
0
32
0
Order By: Relevance
“…In the Appendix, we give tables with bibliographic numbers of the papers, so that interested readers can easily find the original sources for each entry in our tables in the main part of the paper. Accuracy 28 [21], [29], [30], [34]- [36], [42], [63], [64], [69], [80] [33], [44], [53], [55], [56], [66], [79], [86], [89] [22], [48], [50]- [52], [77], [81], […”
Section: Appendixmentioning
confidence: 99%
See 1 more Smart Citation
“…In the Appendix, we give tables with bibliographic numbers of the papers, so that interested readers can easily find the original sources for each entry in our tables in the main part of the paper. Accuracy 28 [21], [29], [30], [34]- [36], [42], [63], [64], [69], [80] [33], [44], [53], [55], [56], [66], [79], [86], [89] [22], [48], [50]- [52], [77], [81], […”
Section: Appendixmentioning
confidence: 99%
“…Recall F-score 20 [30], [33]- [35], [47], [58]- [60], [69], [86] [22], [29], [50]- [52], [62]- [64], [70], [89] Error Rate 13 [21], [28], [34], [39], [40], [43], [49] [38], [65], [67], [73], [85], [89] Confusion Matrix a 20 [35], [43]- [46], [48], [57], [69], [76], [80], [82] [29], [50], [51], [58], [66], [78], [79], [88], [89] Area Under Curve 4 [33], [35], [50], [51] Others b 6 [42], [57],…”
Section: ] Precisionmentioning
confidence: 99%
“…Looking at the dynamic redirection of Web pages has been proposed to detect phishing and spamming webpages in [12,13]. This was extended to using forward and graph based features in [29]. In summary, while excellent results have been achieved by studying the static or dynamic activity of a Web page, the focus has been on detection.…”
Section: Detecting Malicious Content By Analysing the Static Or Dynammentioning
confidence: 99%
“…A static code analysis technique was used; to detect the malicious URL, proposed by Prabhu Seshagiria et al [17]. It analyses the domain, iframe and image, to classify the URL.…”
Section: Related Workmentioning
confidence: 99%