2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) 2022
DOI: 10.1109/icaaic53929.2022.9793231
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Phishing Attacks using Visual Similarity Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…There is also some work using a mixture of features [35][36][37][38]. These approaches may require more computational resources and be more complex to implement compared to URL-based methods.…”
Section: Methods Leveraging Multi-view Informationmentioning
confidence: 99%
“…There is also some work using a mixture of features [35][36][37][38]. These approaches may require more computational resources and be more complex to implement compared to URL-based methods.…”
Section: Methods Leveraging Multi-view Informationmentioning
confidence: 99%
“…These attacks are becoming increasingly sophisticated, exploiting vulnerabilities in email, SMS, and voice communications. The education sector witnessed a dramatic surge of 576% in phishing attacks, while the retail and wholesale sector experienced a 67% drop [27,61].…”
Section: Introductionmentioning
confidence: 99%
“…19 Software methods for detecting phishing attacks are being developed. Software methods for detecting phishing attacks use techniques such as Blacklists, 20 Whitelists, 21 pattern or text matching methods, 22 visual similarity, 23 and machine and deep learning. 24 Deep and machine learning methods are rapidly gaining popularity in the field of cyber security and the detection of phishing attacks.…”
mentioning
confidence: 99%