@incollection{, EC1E1550A0009F41AD19A9FEBF7E823F , author={{R.A.H.DevduniePabasara} and {Dhanushka NiroshanAtimorathanna} and {Tharindu ShehanRanaweera} and {Jayani RukshilaPerera} and {Sri Lanka Institute of Information Technology}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2037783 } @incollection{b0, , title={{A review on recent phishing attacks in Internet}} , author={{ SLakhita } and { BYadav } and { PoojaBohra }} 10.1109/ICGCIoT.2015.7380669 , booktitle={{Proceedings of the 2015 International Conference on Green Computing and Internet of Things}} the 2015 International Conference on Green Computing and Internet of Things , year={ICGCIoT 2015, 2016} } @incollection{b1, , title={{Impact of security awareness training on phishing clickthrough rates}} , author={{ MCarella } and { TMKotsoev } and { Truta }} 10.1109/BigData.2017.8258485 , booktitle={{Proceedings -2017 IEEE International Conference on Big Data}} -2017 IEEE International Conference on Big Data , year={2017, 2017. 2018-January} } @incollection{b2, , title={{Recent survey of various defense mechanisms against phishing attacks}} , author={{ AKTewari } and { BBJain } and { Gupta }} 10.1080/15536548.2016.1139423 , journal={{J. Inf. Priv. Secur}} 12 1 , year={Jan. 2016} } @incollection{b3, , title={{NLP Based Phishing Attack Detection from URLs}} , author={{ EBuber } and { BDiri } and { OKSahingoz }} 10.1007/978-3-319-76348-4_59 , booktitle={{Advances in Intelligent Systems and Computing}} , year={2018} 736 } @incollection{b4, , title={{Detecting DNS-poisoningbased phishing attacks from their network performance characteristics}} , author={{ HKim } and { JHHuh }} 10.1049/el.2011.0399 , journal={{Electronics Letters}} 47 11 , year={2011} } @book{b5, , author={{ "dnsVulnerabilities }} , title={{DNS Security Management}} , publisher={John Wiley & Sons, Inc} , year={2017} } @incollection{b6, , title={{A layout-similarity-based approach for detecting phishing pages}} , author={{ PERosiello } and { EKirda } and { CKruegel } and { FFerrandi }} 10.1109/SECCOM.2007.4550367 , booktitle={{Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks}} the 3rd International Conference on Security and Privacy in Communication Networks , year={2007} } @incollection{b7, , title={{Identify fixed-path phishing attack by STC}} , author={{ HHsu } and { PWang } and { SPu }} 10.1145/2030376.2030396 , booktitle={{ACM International Conference Proceeding Series}} , year={2011} } @incollection{b8, , title={{A comparison of support vector machines and self-organizing maps for email categorization}} , author={{ HBerger } and { DMerkl }} , booktitle={{Aus DM 2005 Proc. -4th Australas. Data Min. Conf. -Collocated with 18th Aust. Jt. Conf. Artif. Intell. AI 2005 2nd Aust. Conf. Artifical Life, ACAL 2005}} , year={2005} } @incollection{b9, , title={{Mitigate web phishing using site signatures}} , author={{ YHuang } and { SPMa } and { WLYeh } and { CYLin } and { CTLiu }} 10.1109/TENCON.2010.5686582 , booktitle={{IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2010}} } @incollection{b10, , title={{Phish Zoo: Detecting phishing websites by looking at them}} , author={{ SAfroz } and { RGreenstadt }} 10.1109/ICSC.2011.52 , booktitle={{Proceedings -5th IEEE International Conference on Semantic Computing}} -5th IEEE International Conference on Semantic Computing , year={2011, 2011} } @incollection{b11, , title={{A Novel Approach to Detect Phishing Attack Using Artificial Neural Networks Combined with Pharming Detection}} , author={{ KGajera } and { MJangid } and { PMehta } and { JMittal }} 10.1109/ICECA.2019.8822053 , booktitle={{Proceedings of the 3rd International Conference on Electronics and Communication and Aerospace Technology}} the 3rd International Conference on Electronics and Communication and Aerospace Technology , year={2019} } @incollection{b12, , title={{Connection-oriented DNS to improve privacy and security}} , author={{ LZhu } and { ZHu } and { JHeidemann } and { DWessels } and { AMankin } and { NSomaiya }} 10.1109/SP.2015.18 , booktitle={{Proceedings -IEEE Symposium on Security and Privacy}} -IEEE Symposium on Security and Privacy , year={2015. 2015-July} } @incollection{b13, , title={{Machine learning based phishing detection from URLs}} , author={{ OKSahingoz } and { EBuber } and { ODemir } and { BDiri }} 10.1016/j.eswa.2018.09.029 , journal={{Expert Syst. Appl}} 117 , year={Mar. 2019} } @incollection{b14, , title={{Phishing websites detection using machine learning}} , author={{ RKiruthiga } and { DAkila }} 10.35940/ijrte.B1018.0982S1119 , journal={{Int. J. Recent Technol. Eng}} 8 2 , year={2019} , note={Special Issue 11} } @incollection{b15, , title={{Spam filtering using Association Rules and Naïve Bayes Classifier}} , author={{ TYang } and { KQian } and { DC TLo } and { KAlNasr } and { YQian }} 10.1109/PIC.2015.7489926 , booktitle={{Proceedings of 2015 IEEE International Conference on Progress in Informatics and Computing}} 2015 IEEE International Conference on Progress in Informatics and Computing , year={2015. 2016} } @incollection{b16, , title={{Visual similarity-based phishing detection without victim site information}} , author={{ MHara } and { AYamada } and { YMiyake }} 10.1109/CICYBS.2009.4925087.18 , booktitle={{2009 IEEE Symposium on Computational Intelligence in Cyber Security}} , year={2009. Feb-2020} 23 , note={1.4 Million New Phishing Sites Launched Each Month} } @incollection{b17, , title={{Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism}} , author={{ YFang } and { CZhang } and { CHuang } and { LLiu } and { YYang }} 10.1109/ACCESS.2019.2913705 , journal={{IEEE Access}} 7 , year={2019} } @incollection{b18, , title={{A multi-tier phishing detection and filtering approach}} , author={{ RIslam } and { JAbawajy }} 10.1016/j.jnca.2012.05.009 , journal={{J. Netw. Comput. Appl}} 36 1 , year={Jan. 2013} } @book{b19, , title={{An Image-based Feature Extraction Approach for Phishing Website Detection}} , note={Usenix-security-submission} } @incollection{b20, , title={{Intelligent phishing website detection using random forest classifier}} , author={{ ASubasi } and { EMolah } and { FAlmkallawi } and { TJChaudhery }} 10.1109/ICECTA.2017.8252051 , booktitle={{2017 International Conference on Electrical and Computing Technologies and Applications}} , year={2017, 2017. 2018-January} }