2016
DOI: 10.1007/s00521-016-2275-y
|View full text |Cite
|
Sign up to set email alerts
|

Fighting against phishing attacks: state of the art and future challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0
8

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 202 publications
(130 citation statements)
references
References 52 publications
0
122
0
8
Order By: Relevance
“…c (pvt.) [21] [38], [72] [22], [41] [38], [41] [72], [77] a Gmail directory [34] b Spam URLs from UAB Spam DataMine email messages [38] c Private SpamTrap system [72], collected using blacklists and crowd-sourcing [41], [77] [78] a MalwareDomainslist [35] and malwareurl [48] b Malware private sources [78] unbalanced, or almost balanced, 9 data. Systems in [43], [59], [73] used more malicious URLs than legitimate ones.…”
Section: ) Dataset Sources and Availability: Inmentioning
confidence: 99%
See 2 more Smart Citations
“…c (pvt.) [21] [38], [72] [22], [41] [38], [41] [72], [77] a Gmail directory [34] b Spam URLs from UAB Spam DataMine email messages [38] c Private SpamTrap system [72], collected using blacklists and crowd-sourcing [41], [77] [78] a MalwareDomainslist [35] and malwareurl [48] b Malware private sources [78] unbalanced, or almost balanced, 9 data. Systems in [43], [59], [73] used more malicious URLs than legitimate ones.…”
Section: ) Dataset Sources and Availability: Inmentioning
confidence: 99%
“…In this survey, features for phishing URL detection are covered, and different kinds of machine learning techniques are surveyed: batch, on-line, representation, and "other." Also, [271], [272] survey a few papers on phishing URL detection, and [9], [11], [273] discuss some of the issues and literature associated with phishing URL detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Phishing scams can be carried out using technical subterfuge and social engineering [6]. Social engineering strategies use "spoofed" emails to guide users to fraudulent websites.…”
Section: Phishing Attack Classificationmentioning
confidence: 99%
“…The list-based solutions contain either black-list or white-list. These list-based solutions match the given domain with the domains present in the black-list or white-list to take the appropriate decision [5,6]. The combination of technical experts and security software verify when a new domain needs to be added in this list.…”
Section: Introductionmentioning
confidence: 99%