|
[1]B. B. Gupta, A. Tewari, A. K. Jain, and D. P. Agrawal, "Fighting against phishing attacks: state of the art and future challenges," Neural Computing and Applications, pp. 1-26, 2016. [2]B. Liang, M. Su, W. You, W. Shi, and G. Yang, "Cracking Classifiers for Evasion: A Case Study on the Google''s Phishing Pages Filter," presented at the Proceedings of the 25th International Conference on World Wide Web, Montreal, Quebec, Canada, 2016. [3]Webroot. Webroot Quarterly Threat Update: 84% of Phishing Sites Exist for Less Than 24 hours. Available: https://www.webroot.com/us/en/about/press-room/ releases/quarterly-threat-update-about-phishing [4]PhishTank. Available: https://www.phishtank.com/ [5]OpenPhish. Available: https://openphish.com/ [6]Phishload. Available: http://www.medien.ifi.lmu.de/team/max.maurer/ files/phishload/ [7]D. G. Dobolyi and A. Abbasi, "PhishMonger: A free and open source public archive of real-world phishing websites," in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016, pp. 31-36. [8]P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, "PhishNet: Predictive Blacklisting to Detect Phishing Attacks," in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1-5. [9]L.-H. Lee, K.-C. Lee, H.-H. Chen, and Y.-H. Tseng, "POSTER: Proactive Blacklist Update for Anti-Phishing," presented at the Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA, 2014. [10]S. Marchal, J. François, R. State, and T. Engel, "PhishStorm: Detecting Phishing With Streaming Analytics," IEEE Transactions on Network and Service Management, vol. 11, no. 4, pp. 458-471, 2014. [11]Q. Cui, G.-V. Jourdan, G. V. Bochmann, R. Couturier, and I.-V. Onut, "Tracking Phishing Attacks Over Time," presented at the Proceedings of the 26th International Conference on World Wide Web, Perth, Australia, 2017. [12]A. K. Jain and B. B. Gupta, "A novel approach to protect against phishing attacks at client side using auto-updated white-list," EURASIP Journal on Information Security, journal article vol. 2016, no. 1, p. 9, 2016. [13]P. Mensah, G. Blanc, K. Okada, D. Miyamoto, and Y. Kadobayashi, "AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users'' Excessive Trust in SSL/TLS," in 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2015, pp. 74-84. [14]C. Amrutkar, Y. S. Kim, and P. Traynor, "Detecting Mobile Malicious Webpages in Real Time," IEEE Transactions on Mobile Computing, 2016. [15]C. L. Tan, K. L. Chiew, K. Wong, and S. N. Sze, "PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder," Decision Support Systems, vol. 88, pp. 18-27, 2016. [16]Z. Dong, A. Kapadia, J. Blythe, and L. J. Camp, "Beyond the lock icon: real-time detection of phishing websites using public key certificates," in 2015 APWG Symposium on Electronic Crime Research (eCrime), 2015, pp. 1-12. [17]I.-C. Lin, Y.-L. Chi, H.-C. Chuang, and M.-S. Hwang, "The Novel Features for Phishing Based on User Device Detection," JCP, vol. 11, no. 2, pp. 109-115, 2016. [18]S. Marchal, K. Saari, N. Singh, and N. Asokan, "Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets," in 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 2016, pp. 323-333. [19]H. Zuhair, A. Selamat, and M. Salleh, "New Hybrid Features for Phish Website Prediction," International Journal of Advances in Soft Computing & Its Applications, vol. 8, no. 1, 2016. [20]M. Lichman, "UCI Machine Learning Repository," ed, 2013. [21]PhishTank Statistic. Available: https://www.phishtank.com/stats/2016/07/ [22]T. Moore and R. Clayton, "Evaluating the Wisdom of Crowds in Assessing Phishing Websites," in Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers, G. Tsudik, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 16-30. [23]X. Han, N. Kheir, and D. Balzarotti, "PhishEye: Live Monitoring of Sandboxed Phishing Kits," presented at the Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016. [24]Y. Cao, W. Han, and Y. Le, "Anti-phishing based on automated individual white-list," presented at the Proceedings of the 4th ACM workshop on Digital identity management, Alexandria, Virginia, USA, 2008. [25]Y. Fu, L. Wenyin, and X. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover''s Distance (EMD)," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 301-311, 2006. [26]R. S. Rao and S. T. Ali, "A Computer Vision Technique to Detect Phishing Attacks," in 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 596-601. [27]S. Bozkir and E. A. Sezer, "Use of HOG descriptors in phishing detection," in 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 2016, pp. 148-153. [28]J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, "BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features," in 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013, pp. 790-795. [29]W. Zhang, H. Lu, B. Xu, and H. Yang, "Web phishing detection based on page spatial layout similarity," Informatica, vol. 37, no. 3, p. 231, 2013. [30]C. Ardi and J. Heidemann, "Auntietuna: Personalized content-based phishing detection," 2016. [31]Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites," presented at the Proceedings of the 16th international conference on World Wide Web, Banff, Alberta, Canada, 2007. [32]V. L. Le, I. Welch, X. Gao, and P. Komisarczuk, "Two-Stage Classification Model to Detect Malicious Web Pages," in 2011 IEEE International Conference on Advanced Information Networking and Applications, 2011, pp. 113-120. [33]L. Wu, X. Du, and J. Wu, "Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms," IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6678-6691, 2016. [34]M. Bahrami, M. Singhal, and Z. Zhuang, "A cloud-based web crawler architecture," in 2015 18th International Conference on Intelligence in Next Generation Networks, 2015, pp. 216-223. [35]R. Chandran and S. Manoharan, "Performance analysis of New Zealand websites using HTTP header values," in Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2011, pp. 25-30. [36]D. DeBarr and H. Wechsler, "Spam detection using clustering, random forests, and active learning," in Sixth Conference on Email and Anti-Spam. Mountain View, California, 2009.
|