Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,736,154 papers from all fields of science
Search
Sign In
Create Free Account
Website spoofing
Known as:
WEB spoofing
, Microsoft Firefox 2007
, Site spoofs
Expand
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
7 relations
Domain masking
Email spoofing
PageRank
Phishing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Real time detection of phishing websites
Abdulghani Ali Ahmed
,
N. A. Abdullah
IEEE 7th Annual Information Technology…
2016
Corpus ID: 17358263
Web Spoofing lures the user to interact with the fake websites rather than the real ones. The main objective of this attack is to…
Expand
Highly Cited
2015
Highly Cited
2015
Utilisation of website logo for phishing detection
K. Chiew
,
Ee Hung Chang
,
S. Sze
,
W. Tiong
Comput. Secur.
2015
Corpus ID: 35026811
Highly Cited
2007
Highly Cited
2007
A layout-similarity-based approach for detecting phishing pages
Angelo P. E. Rosiello
,
E. Kirda
,
Christopher Krügel
,
Fabrizio Ferrandi
Third International Conference on Security and…
2007
Corpus ID: 1904149
Phishing is a current social engineering attack that results in online identity theft. In a phishing attack, the attacker…
Expand
Highly Cited
2007
Highly Cited
2007
On the Effectiveness of Techniques to Detect Phishing Sites
Christian Ludl
,
Sean McAllister
,
E. Kirda
,
Christopher Krügel
DIMVA
2007
Corpus ID: 6460127
Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site…
Expand
Highly Cited
2006
Highly Cited
2006
Phoolproof Phishing Prevention
Bryan Parno
,
C. Kuo
,
A. Perrig
Financial Cryptography
2006
Corpus ID: 8893789
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing…
Expand
Highly Cited
2005
Highly Cited
2005
Trusted paths for browsers
Zishuang Ye
,
Sean W. Smith
TSEC
2005
Corpus ID: 320926
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually…
Expand
2005
2005
Effective Protection Against Phishing and Web Spoofing
R. Oppliger
,
S. Gajek
Communications and Multimedia Security
2005
Corpus ID: 1814117
Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect…
Expand
Highly Cited
2004
Highly Cited
2004
Client-Side Defense Against Web-Based Identity Theft
N. Chou
,
R. Ledesma
,
Y. Teraguchi
,
John C. Mitchell
NDSS
2004
Corpus ID: 1688370
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing…
Expand
2004
2004
Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites
A. Herzberg
,
Ahmad Gbara
2004
Corpus ID: 18002252
In spite of the use of standard web security measures, swindlers often clone sensitive web sites and/or present false credentials…
Expand
Highly Cited
1997
Highly Cited
1997
Web Spoofing: An Internet Con Game
E. Felten
,
D. Balfanz
,
Drew Dean
,
D. Wallach
1997
Corpus ID: 62630777
Web spoofing allows an attacker to create a “shadow copy” of the entire World Wide Web. Accesses to the shadow Web are funneled…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE