共 55 条
[1]
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
[J].
FRONTIERS IN COMPUTER SCIENCE,
2021, 3
[2]
[Anonymous], 2011, NOKIA IDEASPROJECT W
[3]
[Anonymous], 2010, Implementation and benchmarking of perceptual image hash functions
[4]
[Anonymous], 2017, INT C INF SYST CRIS
[5]
APWG, 2021, PHISH ACT TRENDS REP, P13
[6]
Detecting phishing attacks using a combined model of LSTM and CNN
[J].
INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES,
2020, 7 (07)
:56-67
[7]
Ariyadasa Subhash, 2022, Phishrepo-dataset
[8]
Ariyadasa Subhash, 2021, Phishing Websites Dataset
[9]
Baslyman Malak, 2016, 2016 APWG S EL CRIM, P1, DOI [10.1109/ECRIME.2016.7487946, DOI 10.1109/ECRIME.2016.7487946]
[10]
Beck K., 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P649, DOI 10.1109/SocialCom.2010.100