PhishGuard: A browser plug-in for protection from phishing

@article{Joshi2008PhishGuardAB,
  title={PhishGuard: A browser plug-in for protection from phishing},
  author={Yogendra Joshi and Samir Saklikar and Dibakar Das and Snehanshu Saha},
  journal={2008 2nd International Conference on Internet Multimedia Services Architecture and Applications},
  year={2008},
  pages={1-6}
}
Phishing is an act of identity theft aimed at acquiring sensitive information such as usernames, passwords, credit card detail etc., by masquerading as a trustworthy entity in an electronic communication. Phishers use a number of different social engineering mechanism such as spoofed e-mail to try to trick their victims. Data suggests that some of the phishing attacks have convinced up to 5% of their recipients to provide sensitive information to spoofed websites resulting in a direct loss of… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 27 CITATIONS

PhishTackle—a web services architecture for anti-phishing

  • Cluster Computing
  • 2013
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Phishing Detection: A Literature Survey

  • IEEE Communications Surveys & Tutorials
  • 2013
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A New Heuristic Based Phishing Detection Approach Utilizing Selenium Web-driver

Ahmed Nafies Okasha Mohamed, Olaf Manuel Maennel, Raimundas Matulevicius
  • 2017
VIEW 3 EXCERPTS
CITES RESULTS & METHODS
HIGHLY INFLUENCED

HYBRID FEATURES - BASED PREDICTION FOR NOVEL PHISH WEBSITES

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Mitigating man in the middle attack over secure sockets layer

  • 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA)
  • 2009
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-3 OF 3 REFERENCES

Public Key-Embedded Graphic CAPTCHAs

  • 2008 5th IEEE Consumer Communications and Networking Conference
  • 2008
VIEW 2 EXCERPTS

Similar Papers

Loading similar papers…