The Internet has enabled unprecedented communication and new technologies. Concomitantly, it has brought the bane of phishing and exacerbated vulnerabilities. In this thesis, we propose a model to detect phishing webpages from a web developer's perspective. From this standpoint, we design 120 novel features based on content from a webpage, four time-based and two search-based novel features, plus we use 34 other content-based and 11 heuristic features to optimize the model. Moreover, we select Random Committee (Base learner: Random Tree) for our framework since it has the best performance after comparing with six other algorithms: Hellinger Distance Decision Tree, Support Vector Machine (SVM), Logistic Regression, J48, Naive Bayes, and Ran...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
In the modern days the security is the main concern in this rapidly evolving world with the technolo...
The phishing attack is one of the most complex threats that have put internet users and legitimate w...
The Internet has enabled unprecedented communication and new technologies. Concomitantly, it has bro...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Abstract: Phishing attacks remain a significant threat to internet users worldwide. Cybercriminals o...
Due to the rapid growth of the Internet, users change their preference from traditional shopping to ...
Phishing is nothing but one of the kinds of network crimes. This paper presents an efficient approac...
The term phishing is mainly defined as impersonating activities with the site which is used by hacke...
Abstract: A web service is one of the most important Internet communications software services. Usin...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
We are using cyberspace for completing our daily life activities because of the growth of Internet. ...
Because of the colossal growth of internet, most of the users have changed their preference from tra...
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
In the modern days the security is the main concern in this rapidly evolving world with the technolo...
The phishing attack is one of the most complex threats that have put internet users and legitimate w...
The Internet has enabled unprecedented communication and new technologies. Concomitantly, it has bro...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Abstract: Phishing attacks remain a significant threat to internet users worldwide. Cybercriminals o...
Due to the rapid growth of the Internet, users change their preference from traditional shopping to ...
Phishing is nothing but one of the kinds of network crimes. This paper presents an efficient approac...
The term phishing is mainly defined as impersonating activities with the site which is used by hacke...
Abstract: A web service is one of the most important Internet communications software services. Usin...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
We are using cyberspace for completing our daily life activities because of the growth of Internet. ...
Because of the colossal growth of internet, most of the users have changed their preference from tra...
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
In the modern days the security is the main concern in this rapidly evolving world with the technolo...
The phishing attack is one of the most complex threats that have put internet users and legitimate w...