This dataset contains a collection of legitimate and phishing websites, along with information on the target brands (brands.csv) being impersonated in the phishing attacks. The dataset includes a total of 10,395 websites, 5,244 of which are legitimate and 5,151 of which are phishing websites. These websites impersonate a total of 86 different target brands. For phishing datasets, the files can be downloaded in a zip file with a "phishing" prefix, while for legitimate websites, the files can be downloaded in a zip file with a "not-phishing" prefix. In addition, the dataset includes features such as screenshots, text, CSS, and HTML structure for each website, as well as domain information (WHOIS data), IP information, and SSL information. E...
Phish-IRIS dataset is aimed for researchers to supply a ground truth dataset to evaluate their visio...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
The term phishing is mainly defined as impersonating activities with the site which is used by hacke...
The dataset consists of a collection of legitimate as well as phishing website instances. Each insta...
Phishing is a common form of social engineering attack where an attacker crafts a malicious link, un...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
One of the challenges faced by our research was the unavailability of reliable training datasets. In...
This dataset was compiled by Peya Mowar and Mini Jain. We are releasing this dataset for the researc...
The provided dataset includes 11430 URLs with 87 extracted features. The dataset are designed to be ...
This dataset contains 48 features extracted from 5000 phishing webpages and 5000 legitimate webpages...
Along with the means of communication, it has also prompted the birth of more harmful, and challengi...
Corporations that offer online trading can achieve a competitive edge by serving worldwide clients. ...
Phishing is a kind of modern swindles that targets electronic communications users and aims to persu...
PhishRepo is implemented to fill the data gap in the anti-phishing domain, and it is still at an exp...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
Phish-IRIS dataset is aimed for researchers to supply a ground truth dataset to evaluate their visio...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
The term phishing is mainly defined as impersonating activities with the site which is used by hacke...
The dataset consists of a collection of legitimate as well as phishing website instances. Each insta...
Phishing is a common form of social engineering attack where an attacker crafts a malicious link, un...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
One of the challenges faced by our research was the unavailability of reliable training datasets. In...
This dataset was compiled by Peya Mowar and Mini Jain. We are releasing this dataset for the researc...
The provided dataset includes 11430 URLs with 87 extracted features. The dataset are designed to be ...
This dataset contains 48 features extracted from 5000 phishing webpages and 5000 legitimate webpages...
Along with the means of communication, it has also prompted the birth of more harmful, and challengi...
Corporations that offer online trading can achieve a competitive edge by serving worldwide clients. ...
Phishing is a kind of modern swindles that targets electronic communications users and aims to persu...
PhishRepo is implemented to fill the data gap in the anti-phishing domain, and it is still at an exp...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
Phish-IRIS dataset is aimed for researchers to supply a ground truth dataset to evaluate their visio...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
The term phishing is mainly defined as impersonating activities with the site which is used by hacke...