Author:
Lam Ieng-Fat,Xiao Wei-Cheng,Wang Szu-Chi,Chen Kuan-Ta
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Chen, K.-T., Chen, J.-Y., Huang, C.-R., Chen, C.-S.: Fighting Phishing with Discriminative Keypoint Features of Webpages. IEEE Internet Computing (2009)
2. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581–590 (2006)
3. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)
4. Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th International Conference on World Wide Web, pp. 471–479 (2005)
5. Tan, C.H., Teo, J.C.M.: Protection AgainstWeb-based Password Phishing. In: Proceedings of the International Conference on Information Technology, pp. 754–759. IEEE Computer Society, Washington (2007)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. FusionNet: An Effective Network Phishing Website Detection Framework Based on Multi-Modal Fusion;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
3. Detecting Targeted Phishing Websites for Brand Protection and Cyber Defence Using Computer Vision;2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense);2023-11-20
4. The Chameleon on the Web: an Empirical Study of the Insidious Proactive Web Defacements;Proceedings of the ACM Web Conference 2023;2023-04-30
5. Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning;International Journal of Information Security;2023-03-01