Anti-phishing software

Known as: Phishing filter 
Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail or block users from… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
0246820052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
With the rapid development of Internet technology, phishing techniques are increasingly diversified and the Concealment is… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Phishing is a plague in cyberspace. Typically, phish detection methods either use human-verified URL blacklists or exploit Web… (More)
  • figure 1
  • table I
  • table III
  • table IV
  • table V
Is this relevant?
2011
2011
Phishing exhibits characteristics of asymmetric conflict and guerrilla warfare. Phishing sites, upon detection, are subject to… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2010
2010
Phishing is a combination of social engineering and technical deception to steal consumer's personal identity data and financial… (More)
  • figure 1
  • figure 2
  • table 2
  • table 1
  • figure 3
Is this relevant?
2010
2010
Phishing is a web-based attack where users are allured to visit fake websites and provide their personal information. Traditional… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • table III
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper, we study the effectiveness of phishing blacklists. We used 191 fresh phish that were less than 30 minutes old to… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2008
2008
In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2007
2007
Phishing is considered as one of the most serious threats for the Internet and e-commerce. Phishing attacks abuse trust with the… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract. Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?