Visible to the public Biblio

Filters: Keyword is who is command  [Clear All Filters]
2017-03-07
Kumar, B., Kumar, P., Mundra, A., Kabra, S..  2015.  DC scanner: Detecting phishing attack. 2015 Third International Conference on Image Information Processing (ICIIP). :271–276.

Data mining has been used as a technology in various applications of engineering, sciences and others to analysis data of systems and to solve problems. Its applications further extend towards detecting cyber-attacks. We are presenting our work with simple and less efforts similar to data mining which detects email based phishing attacks. This work digs html contents of emails and web pages referred. Also domains and domain related authority details of these links, script codes associated to web pages are analyzed to conclude for the probability of phishing attacks.