4.7 Article

LSTM Based Phishing Detection for Big Email Data

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

A machine learning based approach for phishing detection using hyperlinks information

Ankit Kumar Jain et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Review Computer Science, Artificial Intelligence

Fighting against phishing attacks: state of the art and future challenges

B. B. Gupta et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Book Review Business, Finance

Phishing for Phools: The Economics of Manipulation & Deception

Taylor Spears

QUANTITATIVE FINANCE (2017)

Article Computer Science, Artificial Intelligence

LSTM: A Search Space Odyssey

Klaus Greff et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

APT malware static trace analysis through bigrams and graph edit distance

Alexander D. Bolton et al.

STATISTICAL ANALYSIS AND DATA MINING (2017)

Proceedings Paper Computer Science, Software Engineering

A Content-Based Phishing Email Detection Method

Hongming Che et al.

2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C) (2017)

Article Computer Science, Information Systems

Phishing: An economic analysis of cybercrime perpetrators

Christian Konradt et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Artificial Intelligence

PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder

Choon Lin Tan et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Information Systems

A novel approach to protect against phishing attacks at client side using auto-updated white-list

Ankit Kumar Jain et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2016)

Article Psychology, Multidisciplinary

Phishing threat avoidance behaviour: An empirical investigation

Nalin Asanka Gamagedara Arachchilage et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Computer Science, Information Systems

The design of phishing studies: Challenges for researchers

Kathryn Parsons et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Information security conscious care behaviour formation in organizations

Nader Sohrabi Safa et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey

Nir Nissim et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Cybernetics

Why phishing still works: User strategies for combating phishing attacks

Mohamed Alsharnouby et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2015)

Proceedings Paper Computer Science, Theory & Methods

An Analysis of Social Engineering Principles in Effective Phishing

Ana Ferreira et al.

2015 WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (2015)

Article Computer Science, Artificial Intelligence

An efficacious method for detecting phishing webpages through target domain identification

Gowtham Ramesh et al.

DECISION SUPPORT SYSTEMS (2014)

Article Computer Science, Cybernetics

Phishing for phishing awareness

K. Jansson et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2013)

Article Computer Science, Hardware & Architecture

The State of Phishing Attacks

Jason Hong

COMMUNICATIONS OF THE ACM (2012)

Article Computer Science, Theory & Methods

Trustworthiness testing of phishing websites: A behavior model-based approach

Hossain Shahriar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2012)

Article Computer Science, Hardware & Architecture

Social phishing

Tom N. Jagatic et al.

COMMUNICATIONS OF THE ACM (2007)