Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach

@article{Ali2012DeceptivePD,
  title={Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach},
  author={M. M. Ali and L. Rajamani},
  journal={International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)},
  year={2012},
  pages={458-465}
}
  • M. M. Ali, L. Rajamani
  • Published 2012
  • Computer Science
  • International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)
Key MethodDeceptive Phishing is the major problem in Instant Messengers, much of sensitive and personal information, disclosed through socio-engineered text messages for which solution is proposed[2] but, detection of phishing through voice chatting technique in Instant Messengers is not yet done which is the motivating factor to carry out the work and solution to address this problem of privacy in Instant Messengers (IM) is proposed using Association Rule Mining (ARM) technique a Data Mining approach…Expand
13 Citations
Phishing Detection in IMs using Domain Ontology and CBA - An innovative Rule Generation Approach
  • 3
  • PDF
Logo Image Based Approach for Phishing Detection
  • 1
  • PDF
...
1
2
...

References

SHOWING 1-10 OF 29 REFERENCES
Detecting and filtering instant messaging spam - a global and personalized approach
  • 48
Online Detection and Prevention of Phishing Attacks
  • J. Chen, Chuanxiong Guo
  • Computer Science
  • 2006 First International Conference on Communications and Networking in China
  • 2006
  • 110
Identifying vulnerable websites by analysis of common strings in phishing URLs
  • 29
  • PDF
Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining
  • 40
  • PDF
Security and identification indicators for browsers against spoofing and phishing attacks
  • 115
  • PDF
Attribute-Based Prevention of Phishing Attacks
  • M. Atighetchi, P. Pal
  • Computer Science
  • 2009 Eighth IEEE International Symposium on Network Computing and Applications
  • 2009
  • 32
  • PDF
A study of Internet instant messaging and chat protocols
  • 95
  • PDF
Legal risks for phishing researchers
  • 15
  • Highly Influential
The war of presence and instant messaging: right protocols and APIs
  • M. Debbabi, M. Rahman
  • Computer Science
  • First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.
  • 2004
  • 31
Data Retrieval and Security Using Lightweight Directory Access Protocol
  • 11
  • PDF
...
1
2
3
...