A good phishing site should resemble the target site as much as possible, and it should hide the differences with the target site, at least to the unsuspecting user. This paper leverages this observation to cluster similar suspected phishing sites. Then, instead of crowd-sourcing the verification of a single suspected phishing site, a whole cluster can be verified at once. This is reported to improve both the timeliness and the accuracy of the results on the basis of an experiment with 239 participants. Unfortunately, the control group and the experimental group had a large overlap (174 participants). The authors argue that this does not invalidate the results because of minimal learning effects, but they have no evidence for this. I believ...
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting maliciou...
Phishing is a security threat with serious effects on individuals as well as on the targeted brands....
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensit...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
Phishing webpages present a previously underused resource for information on determining provenance ...
The well-designed "school of phish" experiment compares to what extent three groups, of about 170 pa...
Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and othe...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Phishing is an instance of social engineering techniques used to deceive users into giving their sen...
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting maliciou...
Phishing is a security threat with serious effects on individuals as well as on the targeted brands....
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
Phishing is an ongoing kind of semantic attack that tricks victims into inadvertently sharing sensit...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
Phishing webpages present a previously underused resource for information on determining provenance ...
The well-designed "school of phish" experiment compares to what extent three groups, of about 170 pa...
Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and othe...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Phishing is an instance of social engineering techniques used to deceive users into giving their sen...
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting maliciou...
Phishing is a security threat with serious effects on individuals as well as on the targeted brands....
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...