Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICICS (21. : 2019 : Peking) Information and communications security
1. Verfasser: Zhou, Zhaoyu (VerfasserIn)
Weitere Verfasser: Yu, Lingjing (VerfasserIn), Liu, Qingyun (VerfasserIn), Liu, Yang (VerfasserIn), Luo, Bo (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
UBER: Combating Sandbox Evasion via User Behavior Emulators 2020 Feng, Pengbin
Road Context-Aware Intrusion Detection System for Autonomous Cars 2020 Jiang, Jingxuan
Provably Secure Group Authentication in the Asynchronous Communication Model 2020 Xia, Zhe
Using Equivalent Class to Solve Interval Discrete Logarithm Problem 2020 Qi, Bin
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features 2020 Mai, Long
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs 2020 Wang, Xin
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels 2020 Deng, Ruoyu
CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework 2020 Zhao, Zhenyu
Privacy-Preserving Decentralised Singular Value Decomposition 2020 Liu, Bowen
A Character-Level BiGRU-Attention for Phishing Classification 2020 Yuan, Lijuan
Convolutional Neural Network Based Side-Channel Attacks with Customized Filters 2020 Wei, Man
AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems 2020 Abdelaty, Maged
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data 2020 You, Jianzhou
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks 2020 Li, Meng
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode 2020 Guo, Ning
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks 2020 Tang, Churan
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging 2020 Chen, Qiu
A Multi-Group Signature Scheme from Lattices 2020 Qiu, Tian
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption 2020 Wang, Geng
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes) 2020 Seghier, Athmane
Alle Artikel auflisten