Ceesay, 2008
| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
| Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
| Jakobsson | The human factor in phishing | |
| Fette et al. | Learning to detect phishing emails | |
| Goenka et al. | A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy | |
| Kavin et al. | Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks | |
| Wood et al. | Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection | |
| Jakobsson | The death of the internet | |
| Almousa et al. | Anti-Spoofing in Medical Employee's Email using Machine Learning Uclassify Algorithm | |
| Bundala | Cybercrime: Psychological Tricks and Computer Securities Challenges | |
| Gautam et al. | Phishing prevention techniques: past, present and future | |
| Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
| Rahaman | The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals | |
| Bhadane et al. | STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS. | |
| Ceesay | Mitigating phishing attacks: a detection, response and evaluation framework | |
| Hegt | Analysis of current and future phishing attacks on internet banking services | |
| Wang | Mitigating phishing threats | |
| Chuenchujit | A taxonomy of phishing research | |
| Ahmed | Toward Eradication of Phishing Attacks in E-government Systems | |
| Lakshmi et al. | Advanced Phishing Website Detection Techniques in Internet of Things Using Machine Learning | |
| Tchakounté et al. | True Request–Fake Response: A New Trend of Spear Phishing Attack | |
| Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
| Patel | Design and Implementation of Heuristic based Phishing detection technique | |
| Kavin et al. | Research Article Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks | |
| Wardle | How Long Does It Take To Get Owned |