Author of the publication

Evaluating a semisupervised approach to phishing url identification in a realistic scenario.

, , , , and . CEAS, page 176-183. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance content-based phishing attack detection., , , and . eCrime Researchers Summit, page 1-9. IEEE, (2011)Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale., , , , , , , , and . USENIX Security Symposium, page 361-377. USENIX Association, (2020)CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). IEEE Secur. Priv., 20 (2): 10-21 (2022)Voice of the customer., , and . eCrime, page 1-7. IEEE, (2013)PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists., , , , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2020)Identifying vulnerable websites by analysis of common strings in phishing URLs., , and . eCrime, page 1-13. IEEE, (2009)Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting., , , and . eCrime, page 1-10. IEEE, (2019)PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists., , , , , and . IEEE Symposium on Security and Privacy, page 1344-1361. IEEE, (2019)Automating phishing website identification through deep MD5 matching., and . eCrime, page 1-7. IEEE, (2008)Managing the Crossroads of Academia and Industry.. CODASPY, page 1. ACM, (2018)