2022 5th Information Technology for Education and Development (ITED) 2022
DOI: 10.1109/ited56637.2022.10051199
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Phishing URLs Using Heuristics-Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…One method includes using Machine Learning models to specifically detect phishing URLs by analyzing their characteristics, with the goal of evaluating and choosing the most effective model. [6] The other methods can also be explored here such as using of Machine learning and artificial intelligence which is most prominent nowadays it helps with algorithm and analyze vast amount of data which covers most of the digital or cyber space which individuals are actively involved in order to identify and analyze different patterns and trends. The other most commonly used is Real-Time Detection Technique which helps us filtering the received emails and can be sophisticated phishing attacks, this includes analyzing suspicious URLs, emails content and also user behavior, this point is explained above citated material.…”
Section: Strategiesmentioning
confidence: 99%
“…One method includes using Machine Learning models to specifically detect phishing URLs by analyzing their characteristics, with the goal of evaluating and choosing the most effective model. [6] The other methods can also be explored here such as using of Machine learning and artificial intelligence which is most prominent nowadays it helps with algorithm and analyze vast amount of data which covers most of the digital or cyber space which individuals are actively involved in order to identify and analyze different patterns and trends. The other most commonly used is Real-Time Detection Technique which helps us filtering the received emails and can be sophisticated phishing attacks, this includes analyzing suspicious URLs, emails content and also user behavior, this point is explained above citated material.…”
Section: Strategiesmentioning
confidence: 99%