PhishRepo is implemented to fill the data gap in the anti-phishing domain, and it is still at an experimental level. PhishRepo collects the data available here during its testing stage, and the dataset includes verified phishing webpages. The provided dataset contains diverse information sources from the latest phishing pages. The diverse feature-rich data present in the dataset is a current need in the machine learning-based anti-phishing domain to overcome inept learning models in phishing detection. The dataset can be used to analyse significant phishing features, experiment with different feature extraction techniques, effectively try out some representation learning techniques such as deep learning from these raw data at a practical l...
Nowadays, individuals and organizations are increasingly targeted by phishing attacks,&nbs...
This dataset was compiled by Peya Mowar and Mini Jain. We are releasing this dataset for the researc...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
This dataset contains 48 features extracted from 5000 phishing webpages and 5000 legitimate webpages...
The dataset consists of a collection of legitimate as well as phishing website instances. Each insta...
Phish-IRIS dataset is aimed for researchers to supply a ground truth dataset to evaluate their visio...
The provided dataset includes 11430 URLs with 87 extracted features. The dataset are designed to be ...
This dataset contains a collection of legitimate and phishing websites, along with information on th...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
One of the challenges faced by our research was the unavailability of reliable training datasets. In...
International audienceDespite the growth of prevention techniques, phishing remains an important thr...
Phishing is a common form of social engineering attack where an attacker crafts a malicious link, un...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Nowadays, individuals and organizations are increasingly targeted by phishing attacks,&nbs...
This dataset was compiled by Peya Mowar and Mini Jain. We are releasing this dataset for the researc...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
This dataset contains 48 features extracted from 5000 phishing webpages and 5000 legitimate webpages...
The dataset consists of a collection of legitimate as well as phishing website instances. Each insta...
Phish-IRIS dataset is aimed for researchers to supply a ground truth dataset to evaluate their visio...
The provided dataset includes 11430 URLs with 87 extracted features. The dataset are designed to be ...
This dataset contains a collection of legitimate and phishing websites, along with information on th...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
One of the challenges faced by our research was the unavailability of reliable training datasets. In...
International audienceDespite the growth of prevention techniques, phishing remains an important thr...
Phishing is a common form of social engineering attack where an attacker crafts a malicious link, un...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Nowadays, individuals and organizations are increasingly targeted by phishing attacks,&nbs...
This dataset was compiled by Peya Mowar and Mini Jain. We are releasing this dataset for the researc...
With the development of the Internet, network security has aroused people’s attention. It can be sai...