2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017
DOI: 10.1109/isi.2017.8004877
|View full text |Cite
|
Sign up to set email alerts
|

Phishing detection: A recent intelligent machine learning comparison based on models content and features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
39
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(39 citation statements)
references
References 16 publications
0
39
0
Order By: Relevance
“…Bottazzi et al [23] proposed a framework in Android mobile devices for phishing detection, which includes a machine learning detection engine for protecting from new phishing activities. Abdelhamid et al [14] investigated several machine-learning-based phishing detection techniques on their pros and cons, including evaluation with real-world dataset on their performance. In our preliminary work [24], we used two classifiers to detect phishing attacks from page layout features.…”
Section: Learning-based Phishing Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Bottazzi et al [23] proposed a framework in Android mobile devices for phishing detection, which includes a machine learning detection engine for protecting from new phishing activities. Abdelhamid et al [14] investigated several machine-learning-based phishing detection techniques on their pros and cons, including evaluation with real-world dataset on their performance. In our preliminary work [24], we used two classifiers to detect phishing attacks from page layout features.…”
Section: Learning-based Phishing Detectionmentioning
confidence: 99%
“…Machine learning has been widely used in many areas to create automated solutions. Researchers also use machine learning to detect phishing attacks based on various features [10][11][12][13][14]. The solutions show the potential of machine learning techniques to detect phishing attacks.…”
Section: Introductionmentioning
confidence: 99%
“…41 Ten-fold cross-validation was used to train the classifiers. 42,43 The choice of these algorithms was based on their common use in practical applications and the different learning methods employed during the training process. 44,[45][46] .…”
Section: Specificity =mentioning
confidence: 99%
“…Phishing can be de¯ned according to (Abdelhamid et al, 2017) as imitating a legitimate website by designing a visually similar fake website to defraud online users to unlawfully obtain their credentials to access their¯nancial assets. Phishing can be seen as a criminal act and a serious web threat because of the substantial¯nancial damages it can cause (Mohammad et al, 2015a).…”
Section: Introductionmentioning
confidence: 99%