2020
DOI: 10.1007/978-3-030-57024-8_9
|View full text |Cite
|
Sign up to set email alerts
|

IntAnti-Phish: An Intelligent Anti-Phishing Framework Using Backpropagation Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…However, it needs almost 150 layers [20]. There are several guidelines for determining the number of layers, including two or fewer layers for basic datasets and additional layers for computer vision, time series, or complicated datasets [4,39,40].…”
Section: Deep Learning-based Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it needs almost 150 layers [20]. There are several guidelines for determining the number of layers, including two or fewer layers for basic datasets and additional layers for computer vision, time series, or complicated datasets [4,39,40].…”
Section: Deep Learning-based Detectionmentioning
confidence: 99%
“…The nuanced landscape of phishing techniques showcasing symmetry and asymmetry includes algorithms, domain spoofing, HTTPS phishing, SMS phishing, link handling, email phishing, and pop-ups. Attributes such as prefixes, suffixes, subdomains, IP addresses, URL lengths, '@' symbol, spear phishing, dual-slash attributes, ports, HTTPS tokens, request URLs, URL anchors, tag links, and domain age contribute to the multifaceted nature of phishing attacks [4]. Phishing perpetrators adeptly mimic legitimate websites, particularly those related to online banking and e-commerce.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Detection Systems do not provide efficient detection, especially when the attack patterns of possible attacks are not equal for every attack target. For this reason, the study and deployment of new emerging technologies such as big data and Machine Learning techniques are being introduced in cybersecurity technologies[5]. The detection and prevention of possible intruders into a system is a recurrent security problem.…”
mentioning
confidence: 99%