1 |
Khan, S. A., Khan, W., & Hussain, A. (2020, October). Phishing attacks and websites classification using machine learning and multiple datasets (A comparative analysis). In International Conference on Intelligent Computing (pp. 301-313). Springer, Cham.
|
2 |
Alsariera, Y. A., Elijah, A. V., & Balogun, A. O. (2020). Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations. Arabian Journal for Science and Engineering, 45(12), 10459-10470.
DOI
|
3 |
Ahmad, J., Farman, H., & Jan, Z. (2018). Deep learning methods and applications. Deep Learning: Convergence to Big Data Analytics, 31-42. https://doi.org/10.1007/978-981-13-3459-7_3
DOI
|
4 |
Sanchez-Paniagua, M., Fidalgo, E., Gonzalez-Castro, V., & Alegre, E. (2020, September). Impact of current phishing strategies in machine learning models for phishing detection. In Conference on Complex, Intelligent, and Software Intensive Systems (pp. 87-96). Springer, Cham.
|
5 |
Albawi, S., Mohammed, T. A., & Al-Zawi, S. (2017, August). Understanding of a convolutional neural network. In 2017 International Conference on Engineering and Technology (ICET) (pp. 1-6). IEEE.
|
6 |
Azeez, N., Misra, S., Margaret, I. A., & Fernandez-Sanz, L. (2021). Adopting Automated Whitelist Approach for Detecting Phishing Attacks. Computers & Security, 102328.
|
7 |
Kalaharsha, P., & Mehtre, B. M. (2021). Detecting Phishing Sites--An Overview. arXiv preprint arXiv:2103.12739.
|
8 |
Pradhananga, Y., Karande, S., & Karande, C. (2015, February). CBA: cloud-based bigdata analytics. In 2015 International Conference on Computing Communication Control and Automation (pp. 47-51). IEEE. https://doi.org/10.1109/iccubea.2015.18
DOI
|
9 |
Parra, G. D. L. T., Rad, P., Choo, K. K. R., & Beebe, N. (2020). Detecting Internet of Things attacks using distributed deep learning. Journal of Network and Computer Applications, 163, 102662.
DOI
|
10 |
Wei, W., Ke, Q., Nowak, J., Korytkowski, M., Scherer, R., & Wozniak, M. (2020). Accurate and fast URL phishing detector: a convolutional neural network approach. Computer Networks, 178, 107275.
DOI
|
11 |
Wang, Zhilong, et al. "To detect stack buffer overflow with polymorphic canaries." 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2018.
|
12 |
Bell, S., & Komisarczuk, P. (2020, February). An analysis of phishing blacklists: Google safe browsing, OpenPhish, and PhishTank. In Proceedings of the Australasian Computer Science Week Multiconference (pp. 1-11). https://doi.org/10.1145/3373017.3373020
DOI
|
13 |
Connelly, L. (2020). Logistic regression. Medsurg Nursing, 29(5), 353-354.
|
14 |
Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences, 1(03), 23.
DOI
|
15 |
Korkmaz, M., Sahingoz, O. K., & Diri, B. (2020, July). Detection of Phishing Websites by Using Machine Learning-Based URL Analysis. In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.
|
16 |
Shie, E. W. S. (2020). Critical analysis of current research aimed at improving detection of phishing attacks. Selected computing research papers, 45.
|