2013
DOI: 10.1109/surv.2013.030713.00020
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Phishing Email Filtering Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
108
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 206 publications
(109 citation statements)
references
References 46 publications
1
108
0
Order By: Relevance
“…Unsupervised learning is used which is faster but having low accuracy and hybrid learning which is time consuming and costly. [3] In this paper Ou Wu and Weiming Hu have done work to filter sensitive text by combining semantics and statistics features and analyzed them to construct the CNN (cellular neural network) like word net. This can help to extract right clues, text and helps to avoiding blocking normal text.…”
Section: Research Work Conducted On Web Content Filteringmentioning
confidence: 99%
“…Unsupervised learning is used which is faster but having low accuracy and hybrid learning which is time consuming and costly. [3] In this paper Ou Wu and Weiming Hu have done work to filter sensitive text by combining semantics and statistics features and analyzed them to construct the CNN (cellular neural network) like word net. This can help to extract right clues, text and helps to avoiding blocking normal text.…”
Section: Research Work Conducted On Web Content Filteringmentioning
confidence: 99%
“…"Where: NP→P, NL→P, NP→L, NL→L denote the number of correctly labeled phishing instances, the number of wrongly labeled legitimate instances, the number of phishing instances that are incorrectly recognized as legitimate, and the number of legitimate instances that are identified correctly as legitimate respectively [1,3]." …”
Section: Accuracymentioning
confidence: 99%
“…Many efforts have been made to overcome the phishing attacks through numerous phishing detecting approaches. Nevertheless, phishing has caused enormous money loss in the cyberspace over the past years, which has motivated researchers to seek effective phishing detection techniques that protect users' digital identity [1][2][3]. In general, phishing detection techniques fall into several categories due to the deployed scenarios of detection.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations