Utilisation of website logo for phishing detection
Phishing is a security threat which combines social engineering and website spoofing techniques to deceive users into revealing confidential information. In this paper, we propose a phishing detection method to protect Internet users from the phishing attacks. In particular, given a website, our pro...
| Main Authors: | Chiew, K.L., Chang, E.H., Sze, S.N., Tiong, W.K. |
|---|---|
| Format: | Article |
| Published: |
Elsevier Ltd
2015
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/12739/ |
Similar Items
Phishing detection via identification of website identity
by: Ee, Hung Chang, et al.
Published: (2013)
by: Ee, Hung Chang, et al.
Published: (2013)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
Phishing Email Detection Technique by using Hybrid Features
by: Lew, May Form, et al.
Published: (2015)
by: Lew, May Form, et al.
Published: (2015)
Phishdentity : Leverage Website Favicon to Offset Phishing Website
by: Choo, Jeffrey Soon Fatt
Published: (2015)
by: Choo, Jeffrey Soon Fatt
Published: (2015)
Model for phishing websites classification using artificial neural network
by: Hassan, N. H., et al.
Published: (2021)
by: Hassan, N. H., et al.
Published: (2021)
PhishWHO: Phishing webpage detection via identity keywords
extraction and target domain name finder
by: Tan, Choon Lin, et al.
Published: (2016)
by: Tan, Choon Lin, et al.
Published: (2016)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
by: Tan, Choon Lin, et al.
Published: (2017)
by: Tan, Choon Lin, et al.
Published: (2017)
Email Phishing Detection Model using CNN Model
by: Gurumurthy, M., et al.
Published: (2024)
by: Gurumurthy, M., et al.
Published: (2024)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Simulation of undular bores evolution with damping
by: Tiong, W.K., et al.
Published: (2017)
by: Tiong, W.K., et al.
Published: (2017)
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
by: Yau, Jia Xin
Published: (2023)
by: Yau, Jia Xin
Published: (2023)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Numerical Solution of the Gardner Equation
by: Tiong, W.K., et al.
Published: (2016)
by: Tiong, W.K., et al.
Published: (2016)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Phishing: legal and regulatory challenges
by: Wan Embong, Wan Emril Nizam
Published: (2010)
by: Wan Embong, Wan Emril Nizam
Published: (2010)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
Real life working shift assignment problem
by: Sze, San Nah, et al.
Published: (2017)
by: Sze, San Nah, et al.
Published: (2017)
Utilisation of DAP leaders‘ blogs and DAP‘s official website in creating political awareness
by: Yap, Sing Yeong
Published: (2013)
by: Yap, Sing Yeong
Published: (2013)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
by: Al-Hafiz, Ali Raheem, et al.
Published: (2025)
by: Al-Hafiz, Ali Raheem, et al.
Published: (2025)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Halal logo and consumers' confidence: what are the important factors?
by: Mohamed, Zainal Abidin, et al.
Published: (2008)
by: Mohamed, Zainal Abidin, et al.
Published: (2008)
Simulation of Empty Container Logistic Management at
Depot
by: Sze, San Nah, et al.
Published: (2017)
by: Sze, San Nah, et al.
Published: (2017)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Backpropagation vs. radial basis function neural model : Rainfall intensity classification for flood prediction using meteorology data
by: Chai, S.S., et al.
Published: (2016)
by: Chai, S.S., et al.
Published: (2016)
New Logo, new outlook
Published: (2008)
Published: (2008)
Similar Items
-
Phishing detection via identification of website identity
by: Ee, Hung Chang, et al.
Published: (2013) -
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018) -
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016) -
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024) -
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.