2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031269
|View full text |Cite
|
Sign up to set email alerts
|

An Automated Framework for Real-time Phishing URL Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Furthermore, some recent work on phishing detection has been conducted using the same PhishTank data set, as shown in Table 8. The table includes six different approaches, including KNN [37], SVM [40], random forest classifier [39], RNN [1], NLP [38], and the proposed model, which is a 1D CNN. The accuracy values for each approach are shown alongside the corresponding dataset used for training and testing.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, some recent work on phishing detection has been conducted using the same PhishTank data set, as shown in Table 8. The table includes six different approaches, including KNN [37], SVM [40], random forest classifier [39], RNN [1], NLP [38], and the proposed model, which is a 1D CNN. The accuracy values for each approach are shown alongside the corresponding dataset used for training and testing.…”
Section: Discussionmentioning
confidence: 99%
“…Despite the potential benefits of this process, our literature review has highlighted that some papers analyze the importance of the extracted features as part of the training process (see, e.g. [71], [78], [81], [90], [108], [109]), while only few papers analyze features with the objective of retaining the most representative ones (see, e.g., [82], [91], [110], [111], [112], [113], [114], [115]).…”
Section: B Feature Selectionmentioning
confidence: 99%
“…Wadas [75] presented a model to detect phishing URLs using ML techniques. The datasets used to train the model are from PhishTank [14], and another dataset was adapted from the author's previous work [76]. Lexical and network-based features are extracted in this model by a total of 14 features.…”
Section: ) Lexical and Network-based Features Studiesmentioning
confidence: 99%