Ludl et al., 2007
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Ludl et al. | On the effectiveness of techniques to detect phishing sites | |
| Alkhalil et al. | Phishing attacks: A recent comprehensive study and a new anatomy | |
| Varshney et al. | A survey and classification of web phishing detection schemes | |
| Wu et al. | Effective defense schemes for phishing attacks on mobile computing platforms | |
| Zhang et al. | Phinding phish: Evaluating anti-phishing tools | |
| Jakobsson | The human factor in phishing | |
| Cranor et al. | Phinding Phish: An Evaluation of Anti-Phishing Toolbars. | |
| US10643259B2 (en) | Systems and methods for dynamic vendor and vendor outlet classification | |
| US8448245B2 (en) | Automated identification of phishing, phony and malicious web sites | |
| US20080028444A1 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
| US20090300768A1 (en) | Method and apparatus for identifying phishing websites in network traffic using generated regular expressions | |
| WO2019006412A1 (en) | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators | |
| Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
| Stivala et al. | Deceptive previews: A study of the link preview trustworthiness in social platforms | |
| Varshney et al. | Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress | |
| Dong et al. | User behaviour based phishing websites detection | |
| Shahriar et al. | PhishTester: automatic testing of phishing attacks | |
| Wilson et al. | The fight against phishing: Technology, the end user and legislation | |
| Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
| Muhammad et al. | Information protection of end users on the web: privacy issues and measures | |
| Dhanalakshmi et al. | Detection of phishing websites and secure transactions | |
| Knickerbocker et al. | Humboldt: A distributed phishing disruption system | |
| Çelik et al. | Detection of trickbot and emotet banking trojans with machine learning | |
| Wang | Mitigating phishing threats | |
| Hidayat et al. | Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data Theft |