Login / Signup

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.

Weibo ChuBin B. ZhuFeng XueXiaohong GuanZhongmin Cai
Published in: ICC (2013)
Keyphrases
  • phishing attacks
  • phishing emails
  • security risks
  • internet users
  • query logs
  • website
  • confidential information
  • email
  • co occurrence
  • data sets
  • search engine
  • web search
  • web search engines