1 |
H. J. Kim, "Image-based malware classification using convolutional neural network," Advances in Computer Science and Ubiquitous Compuging, pp. 1352-1357, 2017.
|
2 |
V. Suganya, "A review on phishing attacks and various anti-phishing techniques," Int. Journal of Computer Applications, vol. 139, pp. 20-23, 2016.
DOI
|
3 |
K. L. Chiew, K. S. C. Yong and C. Tan, "A survey of phishing attacks: their types, vectors and technical approaches," Expert Systems with Applications, vol. 106, pp. 1-20, 2018.
DOI
|
4 |
I. Qabajeh, F. Thabtah and F. Chiclana, "A recent review of conventional vs. automated cybersecurity anti-phishing techniques," Computer Science Review, vol. 29, pp. 44-55, 2018.
DOI
|
5 |
J. Y. Kim, S. J. Bu and S. B. Cho, "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders," Information Sciences, vol. 460, pp. 83-102, 2018.
DOI
|
6 |
H. J. Kim, "Malware classification using convolutional and recurrent neural network," In Summer Annual Conf. of the Institute of Electronics and Information Engineering, pp. 1329-1331, 2017.
|
7 |
P. Prakash, M. Kumar, R. R. Kompella and M. Gupta, "Phishnet: Predictive blacklisting to detect phishing attacks," In Proc. of IEEE Int. Conf. on Computer Communications, pp. 1-5, 2010.
|
8 |
J. Ma, L. K. Saul, S. Savage and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," In Proc. of the 15th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 1245-1254, 2009.
|
9 |
A. Le, A. Markopoulou and M. Faloutsos, "Phishdef: URL names say it all," In Proc. of IEEE Int. Conf. on Computer Communications, pp. 191-195, 2011.
|
10 |
R. Verma and K. Dyer, "On the character of phishing URLs: Accurate and robust statistical learning classifiers," In Proc. of the 5th ACM Conf. on Data and Application Security and Privacy, pp. 111-122, 2015.
|
11 |
A. C. Bahnsen, E. C. Bohorquez, S. Villegas, J. Vargas and F. A. Gonzalez, "Classifying phishing URLs using recurrent neural networks," In 2017 APWG Symposium on Electronic Crime Research, pp. 1-8, 2017.
|
12 |
J. Zhao, N. Wang, Q. Ma and Z. Cheng, "Classifying malicious URLs using gated recurrent neural networks," In Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 385-394, 2018.
|
13 |
A. Anand, K. Gorde, J. R. A. Moniz, N. Park, T. Chakraborty and B. T. Chu, "Phishing URL detection with oversampling based on text generative adversarial networks," In 2018 IEEE Int. Conf. on Big Data, pp. 1168-1177, 2018.
|
14 |
W. Yang, W. Zuo and B. Cui, "Detecting malicious URLs via a keyword-based convolutional gated recurrent unit neural network," IEEE Access, 2019.
|
15 |
NetScape, "Dmoz open directory project," http://www.dmoz.org.
|
16 |
X. Zhang, J. Zhao and Y. LuCun, "Character-level convolutional networks for text classification," In Advances in Neural Information Processing Systems, pp. 649-657, 2015.
|
17 |
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado and J. Dean, "Distributed representations of words and phrases and their compositionality," In Advances in Neural Information Processing Systems, pp. 3111-3119, 2013.
|
18 |
OpenDNS, "Phishtank," http://www.phishtank.com.
|