Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 826, Pages 1–60https://doi.org/10.1145/3613904.3642843Two popular approaches for helping consumers avoid phishing threats are phishing awareness videos and tools supporting users in identifying phishing emails. Awareness videos and tools have each been shown on their own to increase people’s phishing ...
- research-articleOctober 2023
Influence of URL Formatting on Users' Phishing URL Detection
EuroUSEC '23: Proceedings of the 2023 European Symposium on Usable SecurityPages 318–333https://doi.org/10.1145/3617072.3617111Despite technical advances in anti-phishing protection, in many cases the detection of phishing URLs largely depends on users manually inspecting the links found in suspicious emails. One solution proposed to support users in doing so is to use a URL ...
- research-articleJanuary 2023
A contemporary anti-phishing framework based on visual cryptography and steganography
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 13, Issue 2Pages 139–158https://doi.org/10.1504/ijitst.2023.129586In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential ...
- research-articleJanuary 2022
A hybrid model to detect phishing-websites
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 12, Issue 6Pages 483–502https://doi.org/10.1504/ijitst.2022.126472Phishing and fraud sites has been widespread on the internet in recent times, in which that it is becoming a source of great concern and a serious cyber security problem, as internet fraudsters target sensitive data and personal information of users, ...
- research-articleJuly 2019
PhishLedger: A Decentralized Phishing Data Sharing Mechanism
IECC '19: Proceedings of the 1st International Electronics Communication ConferencePages 84–89https://doi.org/10.1145/3343147.3343154In recent years, phishing has become one of the biggest security threats on the Internet. To combat phishing, it requires multiple steps and multi-agency participation and thus desperately need uniform data sharing format and unobstructed sharing ...
-
- research-articleMay 2019
What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPaper No.: 108, Pages 1–12https://doi.org/10.1145/3290605.3300338Phishing attacks are a major problem, as evidenced by the DNC hackings during the 2016 US presidential election, in which staff were tricked into sharing passwords by fake Google security emails, granting access to confidential information. ...
- research-articleFebruary 2018
An anti-phishing method based on feature analysis
ICMLSC '18: Proceedings of the 2nd International Conference on Machine Learning and Soft ComputingPages 133–139https://doi.org/10.1145/3184066.3184082Since the rapid advancement in computer networks and ebusiness technologies, massive numbers of sales transactions are performed on the World Wide Web on daily basis. These transactions necessitate online financial payments and the use of ebanking hence ...
- research-articleApril 2017
Detecting Phishing Websites using Automation of Human Behavior
CPSS '17: Proceedings of the 3rd ACM Workshop on Cyber-Physical System SecurityPages 33–42https://doi.org/10.1145/3055186.3055188In this paper, we propose a technique to detect phishing attacks based on behavior of human when exposed to fake website. Some online users submit fake credentials to the login page before submitting their actual credentials. He/She observes the login ...
- articleJanuary 2017
An overview of phishing attacks and their detection techniques
- Mehdi Dadkhah,
- Mohammad Davarpanah Jazi,
- Majid Saidi Mobarakeh,
- Shahaboddin Shamshirband,
- Xiaojun Wang,
- Sachin Raste
International Journal of Internet Protocol Technology (IJIPT), Volume 9, Issue 4Pages 187–195https://doi.org/10.1504/IJIPT.2016.081319With rapid spread of the internet and cyber space, it has gained numerous applications and has been used as a powerful tool for social collaborations, communications and trades. The internet has superior performance to the traditional ways, as well as ...
- articleNovember 2016
Securing mobile access with interactive image code and image key encryption
Security and Communication Networks (SACN), Volume 9, Issue 16Pages 3412–3427https://doi.org/10.1002/sec.1548In this paper, we propose a novel anti-phishing scheme, image code-based anti-phishing scheme ICAP, for securing mobile access through an image code. The proposed scheme can protect mobile users from phishing attack and side-glance attack which are ...
- ArticleDecember 2012
Mining Web to Detect Phishing URLs
ICMLA '12: Proceedings of the 2012 11th International Conference on Machine Learning and Applications - Volume 01Pages 568–573https://doi.org/10.1109/ICMLA.2012.104Proliferation of phishing attacks in recent years has presented an important cyber security research area. Over the years, there has been an increase in the technology, diversity, and sophistication of these attacks in response to increased user ...
- ArticleJuly 2012
Building an Anti-phishing Game to Enhance Network Security Literacy Learning
ICALT '12: Proceedings of the 2012 IEEE 12th International Conference on Advanced Learning TechnologiesPages 121–123https://doi.org/10.1109/ICALT.2012.174Internet phishing attack is increasing and causing enormous economic loss in recent years. The network security literacy learning for educating students to defense phishing attack becomes more important. However, with the growing of attacking tricks, ...
- ArticleJune 2012
Feature selection for improved phishing detection
IEA/AIE'12: Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligencePages 252–261https://doi.org/10.1007/978-3-642-31087-4_27Phishing --- a hotbed of multibillion dollar underground economy --- has become an important cybersecurity problem. The centralized blacklist approach used by most web browsers usually fails to detect zero-day attacks, leaving the ordinary users ...
- rfcSeptember 2011
RFC 6376: DomainKeys Identified Mail (DKIM) Signatures
DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or ...
- research-articleNovember 2010
Web phishing detection using classifier ensemble
iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & ServicesPages 210–215https://doi.org/10.1145/1967486.1967521This research adapts and develops various methods in Artificial Intelligent (A.I) field to improve web phishing detection. Based on the features from Carnegie Mellon Anti-phishing and Network Analysis Tool (CANTINA), we add, modify or reduce features in ...
- ArticleApril 2010
A DNS Based Anti-phishing Approach
NSWCTC '10: Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02Pages 262–265https://doi.org/10.1109/NSWCTC.2010.196Most of the phishing and pharming attacks are directed at the payment and financial services, with the purpose to steal online bank users’ card number and password. This paper presents the design and implementation of a DNS based anti-phishing approach, ...
- ArticleJanuary 2010
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection
WKDD '10: Proceedings of the 2010 Third International Conference on Knowledge Discovery and Data MiningPages 187–190https://doi.org/10.1109/WKDD.2010.108This paper presents a study on using a concept feature to detect web phishing problem. Following the features introduced in Carnegie Mellon Anti-phishing and Network Analysis Tool (CANTINA), we applied additional domain top-page similarity feature to a ...
- ArticleSeptember 2009
On the usability of user interfaces for secure website authentication in browsers
EuroPKI'09: Proceedings of the 6th European conference on Public key infrastructures, services and applicationsPages 239–254Public Key cryptography has become, in many environments, a fundamental building block for authentication purposes. Although many applications already support the usage of Public Key Certificates (PKCs), the usability of the many security features and ...
- ArticleAugust 2009
Browser-Side Countermeasures for Deceptive Phishing Attack
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01Pages 352–355https://doi.org/10.1109/IAS.2009.12Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit ...
- ArticleJune 2009
Countermeasure Techniques for Deceptive Phishing Attack
NISS '09: Proceedings of the 2009 International Conference on New Trends in Information and Service SciencePages 636–641https://doi.org/10.1109/NISS.2009.80Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit ...