2019
DOI: 10.1016/j.pmcj.2019.101084
|View full text |Cite
|
Sign up to set email alerts
|

PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(28 citation statements)
references
References 27 publications
0
28
0
Order By: Relevance
“…Rao et al [ 55 ] proposed a mobile application called PhishDump to categorize legitimate and phishing websites on mobile devices. PhishDump works with multiple models using the long short-term memory (LSTM) and support vector machine (SVM) classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Rao et al [ 55 ] proposed a mobile application called PhishDump to categorize legitimate and phishing websites on mobile devices. PhishDump works with multiple models using the long short-term memory (LSTM) and support vector machine (SVM) classifier.…”
Section: Related Workmentioning
confidence: 99%
“…However, architectures based on deep learning models usually introduce the following problems. First of all, deep learning algorithms have high hardware requirements and a lot of calculations, so they cannot be configured on mobile portable devices 4,28 . Secondly, due to the complexity of the deep learning model, it is difficult to design a deep learning model that meets the specified application scenarios.…”
Section: Future Discussionmentioning
confidence: 99%
“…The static analysis technology based on the features of PC web pages has been widely used. It should be noted that phishing is one of the most serious threats in current mobile and social networks 3,6,28 . To mitigate potential phishing attacks on PC‐side web pages, some effective solutions have been proposed in recent years, including e‐mail filtering, 29 using content‐based features, 30 blacklist, 11‐13 and deployability and usability in real world 22 .…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similar to DNN and CNN, LSTM can be implemented individually [20,[41][42][43][44][45], incorporated with traditional machine learning techniques [46,47], or combined with other DL algorithms in a hybrid model for an improved performance in detecting malicious websites [10,11,31,33,35,36]. Among the studies of LSTM-based phishing detection models, a majority of them specified the parameter settings for neural network architecture, number of epochs, and learning rate; but ignored the dropout rate and batch size [31,41,42,44,47].…”
Section: Long Short-term Memory (Lstm)mentioning
confidence: 99%
“…Other measures training time, detection time, error rate, detection cost, number of epochs per second, etc. [33,42,46,47].…”
Section: Long Short-term Memory (Lstm)mentioning
confidence: 99%