Home
Add Document
Sign In
Create An Account
A framework for phishing attack identification using ...
Recommend Documents
No documents
A framework for phishing attack identification using ...
Download PDF
3 downloads
3344 Views
199KB Size
Report
Comment
Tata Consultancy
Services
,. Mumbai,
India
.
Email
:
[email protected]
. Abstract: Convergence of information and communication on technology changed the ...
Int. J. Communication Networks and Distributed Systems, Vol. 18, No. 2, 2017
$IUDPHZRUNIRUSKLVKLQJDWWDFNLGHQWLILFDWLRQXVLQJ URXJKVHWDQGIRUPDOFRQFHSWDQDO\VLV 16\HG6LUDM$KPHGDQG'3$FKDUM\D 6FKRRORI&RPSXWLQJ6FLHQFHDQG(QJLQHHULQJ 9,78QLYHUVLW\ 9HOORUH7DPLO1DGX,QGLD (PDLOQVVD#JPDLOFRP (PDLOGSDFKDUM\D#JPDLOFRP
&RUUHVSRQGLQJDXWKRU
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µ$ IUDPHZRUN IRU SKLVKLQJ DWWDFN LGHQWLILFDWLRQ XVLQJ URXJK VHW DQG IRUPDO FRQFHSW DQDO\VLV¶ Int. J. Communication Networks and Distributed Systems 9RO 1R SS± %LRJUDSKLFDO QRWHV 1 6\HG 6LUDM $KPHG UHFHLYHG KLV 03KLO LQ &RPSXWHU 6FLHQFH IURP 3HUL\DU 8QLYHUVLW\ 6DOHP 7DPLOQDGX ,QGLD LQ DQG FXUUHQWO\ SXUVXLQJ KLV 3K' LQ &RPSXWHU 6FLHQFH DQG (QJLQHHULQJ DW 9,7 8QLYHUVLW\ 9HOORUH ,QGLD +LV UHVHDUFK LQWHUHVWV LQFOXGH URXJK VHWV GDWD DQDO\VLVQHWZRUNVHFXULW\DQGFRPSXWLQJLQWHOOLJHQFH
&RS\ULJKW,QGHUVFLHQFH(QWHUSULVHV/WG
N.S.S. Ahmed et al.
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
5HIHUHQFHV $FKDUM\D'3DQG0DU\$* µ3ULYDF\SUHVHUYDWLRQLQLQIRUPDLRQV\VWHP¶LQAdvances in Secure Computing, Internet Services and ApplicationsSS±,*,*OREDO3XEOLVKHU86$ %DVQHW5%DQG6XQJ$+ µ&ODVVLI\LQJSKLVKLQJHPDLOVXVLQJFRQILGHQFHZHLJKWHGOLQHDU FODVVLILHU¶ Proceeding International Conference on Information Security and Artificial Intelligence9ROSS± %DVQHW 5% DQG 6XQJ $+ µ0LQLQJ ZHE WR GHWHFW SKLVKLQJ 85/V¶ 11th International Conference in Machine Learning and Algorithm9ROSS± %DVQHW 5% 0XNNDPDOD 6 DQG 6XQJ $+ µ'HWHFWLRQ RI SKLVKLQJ DWWDFNV D PDFKLQH OHDUQLQJ DSSURDFK¶ Studies in Fuziness and Soft Computing 6SULQJHU 9RO 1R SS± %DVQHW 5% 6XQJ $+ DQG /LX 4 µ5XOHEDVHG SKLVKLQJ DWWDFN GHWHFWLRQ¶ Studies in Fuziness and Soft Computing9RO1RSS± %KDWWDVDOL 7 &KDNL 5 6DQ\DO 6 µ6OHHS GHSULYDWLRQ DWWDFN GHWHFWLRQ LQ ZLUHOHVV VHQVRU QHWZRUN¶International Journal of Computer Applications9RO1RSS± &KHQ;%RVH,/DXQJ$&0DQG*XR& µ$VVHVVLQJWKHVHYHULW\RISKLVKLQJDWWDFNVD K\EULGGDWDPLQLQJDSSURDFK¶Decision Support Systems9RO1RSS± &KKLNDUD - 'DKL\D 5 *DUJ 1 DQG 5DQL 0 µ3KLVKLQJ DQG DQWLSKLVKLQJ WHFKQLTXHV FDVHVWXG\¶International Journal of Advanced Research in Computer Science and Software Engineering9RO1RSS± 'H6WHIDQR&)RQWDQHOOD)0DUURFFR&DQG)UHFD$6 µ$*$EDVHGIHDWXUHVHOHFWLRQ DSSURDFK ZLWK DQ DSSOLFDWLRQ WR KDQGZULWWHQ FKDUDFWHU UHFRJQLWLRQ¶ Pattern Recognition Letter9RO1RSS± 'KXUDQGKHU 6. 0LVKUD 6 $JUDZDO ' DQG 5D\DQNXOD $ µ8VLQJ KRQH\QRGHV DORQJ ZLWKFKDQQHOVXUILQJIRUGHIHQVHDJDLQVWMDPPLQJDWWDFNVLQZLUHOHVVQHWZRUNV¶Proceedings of 3rd International Conference on Systems and Network CommunicationsSS± 'RVKL 6 3URYRV 1 &KHZ 0 DQG 5XELQ $' µ$ IUDPHZRUN IRU GHWHFWLRQ DQG PHDVXUHPHQW RI SKLVKLQJ DWWDFNV¶ Proceeding ACM Workshop on Rapid Malcode 9RO 1RSS± 'XDQ / ;X / DQG *XR ) µ$ ORFDOGHQVLW\ EDVHG RQ VSDWLDO FOXVWHULQJ DOJRULWKP ZLWK QRLVH¶Information Systems9RO1RSS± )HWWH,6DGHK1DQG7RVPDVLF$ µ/HDUQLQJWRGHWHFWSKLVKLQJHPDLOV¶Proceeding 16th International Conference on World Wide Web9ROSS± *R\DO$.XPDU96LQJK0$EUDKDP$DQG6DQ\DO6 µ$QHZSURWRFROWRFRXQWHU RQOLQHGLFWLRQDU\DWWDFNV¶Computers and Security9RO1RSS± .DWDULD-'KHNQH36DQG6DQ\DO6 µ$VFKHPHWRFRQWUROIORRGLQJRIIDNHURXWHUHTXHVWV LQ DGKRF QHWZRUNV¶ Third International Conference on Computers and Devices for CommunicationsSS± 0D - 6DXO /. 6DIDJH 6 DQG 9RHONHU *0 µ%H\RQG EODFNOLVWV OHDUQLQJ WR GHWHFW PDOLFLRXV ZHEVLWHV IURP VXVSLFLRXV 85/V¶ Proceeding ACMSIGKDD Conference 9RO 1RSS±
A framework for phishing attack identification using RSFCA
0LVKUD 0 *DXUDY $ DQG -DLQ $3 µ$ SUHYHQWLYH DQWLSKLVKLQJ WHFKQLTXHV XVLQJ FRGH ZRUG¶ International Journal of Engineering Research and Applications 9RO 1R SS± 0LVUD6%DJFKL$%KDWW5*KRVK6DQG2EDLGDW06 µ$WWDFNJUDSKJHQHUDWLRQZLWK LQIXVHG IX]]\ FOXVWHULQJ¶ Proceedings of International Conference on Security and CryptologySS± 0LVUD 6 'KXUDQGKHU 6. 5D\DQNXOD $ DQG $JUDZDO ' D µ8VLQJ KRQH\QRGHV IRU GHIHQVH DJDLQVW MDPPLQJ DWWDFNV LQ ZLUHOHVV LQIUDVWUXFWXUH EDVHG QHWZRUNV¶ Computers and Electrical Engineering9RO1RSS± 0LVUD6*KRVK$6DJDU$3DQG2EDLGDW06E µ'HWHFWLRQRILGHQWLW\EDVHGDWWDFNVLQ ZLUHOHVV VHQVRU QHWZRUNV 8VLQJ VLJQDO SULQWV¶ Proceedings of International Conference on Green Computing and CommunicationsSS± 0LVUD 6 .ULVKQD 39 $EUDKDP ., 6DVLNXPDU 1 DQG )UHGXQ 6 F µ$Q DGDSWLYH OHDUQLQJURXWLQJSURWRFROIRUWKHSUHYHQWLRQRIGLVWULEXWHGGHQLDORIVHUYLFHDWWDFNVLQZLUHOHVV PHVKQHWZRUNV¶Computers & Mathematics with Applications9RO1RSS± 0LVUD 6 6LQJK 5 DQG 0RKDQ 695 G µ,QIRUPDWLRQ ZDUIDUH ZRUWK\ MDPPLQJ DWWDFN GHWHFWLRQ PHFKDQLVP IRU ZLUHOHVV VHQVRU QHWZRUNV XVLQJ IX]]\ LQIHUHQFH V\VWHP¶ Sensors 9RO1RSS± 0L\DPRWR ' +D]H\DPD + DQG .DGRED\DVKL
×
Report "A framework for phishing attack identification using ..."
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Our partners will collect data and use cookies for ad personalization and measurement.
Learn how we and our ad partner Google, collect and use data
.
Agree & close