Kanthety, 2010
| Publication | Publication Date | Title |
|---|---|---|
| Chen et al. | Online detection and prevention of phishing attacks | |
| Alazab et al. | Spam and criminal activity | |
| US7496634B1 (en) | Determining whether e-mail messages originate from recognized domains | |
| Athulya et al. | Towards the detection of phishing attacks | |
| Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
| Huang et al. | Countermeasure techniques for deceptive phishing attack | |
| Naresh et al. | Intelligent phishing website detection and prevention system by using link guard algorithm | |
| Hajgude et al. | Phish mail guard: Phishing mail detection technique by using textual and URL analysis | |
| Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
| Singh | Detection of Phishing e-mail | |
| Waziri | Website forgery: understanding phishing attacks and nontechnical countermeasures | |
| Suriya et al. | An integrated approach to detect phishing mail attacks: A case study | |
| Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
| Singh et al. | A survey on phishing and anti-phishing techniques | |
| Sankhwar et al. | A comparative analysis of anti-phishing mechanisms: Email phishing. | |
| Chaudhary | Development review on phishing: a computer security threat | |
| Venkatesh et al. | Identification and isolation of crypto ransomware using honeypot | |
| Gan et al. | Phishing: a growing challenge for Internet banking providers in Malaysia | |
| Bhati et al. | Prevention approach of phishing on different websites | |
| Sankhwar et al. | Defending Against Phishing: Case Studies. | |
| Bhardwaj et al. | Types of hacking attack and their countermeasure | |
| Kanthety | Prevention of Phishing Attacks using Link-Guard Algorithm | |
| KR20070019896A (en) | Anti-phishing techniques and programs through filtering UAL and important information | |
| IOVAN et al. | MALWARE FOR MOBILE DEVICES AND THEIR SECURITY. | |
| Mihai | Overview on phishing attacks |