An approach for detecting phishing websites by using search engine
Abstract
References
Index Terms
- An approach for detecting phishing websites by using search engine
Recommendations
Clustering potential phishing websites using DeepMD5
LEET'12: Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent ThreatsPhishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing ...
A Sender-Centric Approach to Detecting Phishing Emails
CYBERSECURITY '12: Proceedings of the 2012 International Conference on Cyber SecurityEmail-based online phishing is a critical security threat on the Internet. Although phishers have great flexibility in manipulating both the content and structure of phishing emails, phishers have much less flexibility in completely concealing the ...
Search Engine Optimization (SEO) for Websites
ICCTA '19: Proceedings of the 2019 5th International Conference on Computer and Technology ApplicationsWith the growth of the Internet in the recent years, search engines such as Google, Bing, and Yahoo are becoming more and more crucial and reliable. The role of search engines is to index billions of web pages and display only the most relevant results ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 16Total Downloads
- Downloads (Last 12 months)16
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format