A survey of cyber crimes, vol.5, pp.422-437, 2012. ,
System security: a hacker's perspective, Interex Proceedings, vol.1, pp.6-6, 1987. ,
Phishing attack trends report -3q, 2018. ,
Phishmon: A machine learning framework for detecting phishing webpages, Intelligence and Security Informatics, pp.220-225, 2018. ,
A deep learning based online malicious url and dns detection scheme, Security and Privacy in Communication Systems, pp.438-448, 2017. ,
Martine DeCock, and Anderson Nascimento. Dictionary extraction and detection of algorithmically generated domain names in passive dns traffic, Research in Attacks, Intrusions, and Defenses, pp.295-314, 2018. ,
kn0w thy doma1n name": Unbiased phishing detection using domain name based features, Access Control Models and Technologies, pp.69-75, 2018. ,
A stacking model using url and html features for phishing webpage detection, Future Generation Computer Systems, vol.94, pp.27-39, 2019. ,
Adversarial classification, international conference on Knowledge discovery and data mining, pp.99-108, 2004. ,
, ISTR Internet Security Threat Report, vol.23
Machine learning based phishing detection from urls, Expert Systems with Applications, vol.117, pp.345-357, 2019. ,
On the character of phishing urls: Accurate and robust statistical learning classifiers, Data and Application Security and Privacy, pp.111-122, 2015. ,
Needle in a haystack: Tracking down elite phishing domains in the wild, Internet Measurement Conference, pp.429-442, 2018. ,
Adversarial machine learning, ACM workshop on Security and artificial intelligence, pp.43-58, 2011. ,
Is feature selection secure against training data poisoning?, International Conference on Machine Learning, pp.1689-1698, 2015. ,
Security evaluation of pattern classifiers under attack, IEEE transactions on knowledge and data engineering, vol.26, pp.984-996, 2014. ,
Yes, machine learning can be more secure! a case study on android malware detection, 2017. ,
Analyzing the robustness of nearest neighbors to adversarial examples, International Conference on Machine Learning, pp.5120-5129, 2018. ,
, , vol.10, 2016.
Wild patterns: Ten years after the rise of adversarial machine learning, 2017. ,
An assessment of features related to phishing websites using an automated technique, Internet Technology And Secured Transactions, pp.492-497, 2012. ,
UCI machine learning repository, 2017. ,
Phishing detection based associative classification data mining, Expert Systems with Applications, vol.41, issue.13, pp.5948-5959, 2014. ,
Phishing dataset for machine learning: Feature evaluation, 2018. ,
Countering phishing from brands' vantage point, International Workshop on Security And Privacy Analytics, pp.17-24, 2016. ,