2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6654816
|View full text |Cite
|
Sign up to set email alerts
|

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
41
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(42 citation statements)
references
References 13 publications
1
41
0
Order By: Relevance
“…W. Chu et el. [6] presented a machine learning based phishing detector using only lexical and domain features, which are available even when the phishing webpages are inaccessible (since many phishing Webpages had a very short life span). They investigated the effectiveness of each feature, and each group of features on classification accuracy.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…W. Chu et el. [6] presented a machine learning based phishing detector using only lexical and domain features, which are available even when the phishing webpages are inaccessible (since many phishing Webpages had a very short life span). They investigated the effectiveness of each feature, and each group of features on classification accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Two feature combinations achieve the best overall accuracy of 94.87% for SVM classifier. The first comprises of the following 16 features: 2, 6,7,8,9,11,13,14,15,19,20,24,25,26,27,28. The second comprises of the same 16 features in the first combination except replacing the Redirect feature with popUpWidnow.…”
Section: Evaluation With Omitting Redundant Featuresmentioning
confidence: 99%
See 3 more Smart Citations