Adaptive Autonomous Secure Cyber Systems 2020
DOI: 10.1007/978-3-030-33432-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Phishing URL Detection with Lexical Features and Blacklisted Domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(22 citation statements)
references
References 25 publications
0
22
0
Order By: Relevance
“…Authors maintained similar parameters for all detectors. However, the proposed method, LURL produced a better outcome rather than Hung Le et al [ 5 ] and Hong J. et al [ 6 ]. LURL covered 94.3 percent of data with learning rate of 5.0 whereas Hung Le et al and Hong J. et al have reached 93.8 and 92.8, respectively.…”
Section: Resultsmentioning
confidence: 71%
See 4 more Smart Citations
“…Authors maintained similar parameters for all detectors. However, the proposed method, LURL produced a better outcome rather than Hung Le et al [ 5 ] and Hong J. et al [ 6 ]. LURL covered 94.3 percent of data with learning rate of 5.0 whereas Hung Le et al and Hong J. et al have reached 93.8 and 92.8, respectively.…”
Section: Resultsmentioning
confidence: 71%
“…Social engineering attacks include Spear phishing, Whaling, SMS, Vishing, and mobile applications. In these attacks, attackers focus on the group of people or an organization and trick them to use the phishing URL [ 6 , 7 ]. Apart from these attacks, many new attacks are emerging exponentially as the technology evolves constantly.…”
Section: Research Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations