Phishing Website Detection Using Website Logo
Phishing is an online security threat that combines social engineering and website deceiving technique to steal internet users’ confidential credential. In order to protect internet users from phishing attacks, a hybrid phishing detection method has been proposed. The proposed method utilises logo i...
| Main Author: | Chang, Ee Hung |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
Universiti Malaysia Sarawak (UNIMAS)
2019
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/25607/ |
| Abstract | Abstract here |
Similar Items
Leveraging Ensemble Strategies in Identity Verification and Feature Optimisation for Phishing Website Detection
by: Tan, Colin Choon Lin
Published: (2021)
by: Tan, Colin Choon Lin
Published: (2021)
Phishing website detection using random forest algorithm
by: Chiang, Jun Heng
Published: (2025)
by: Chiang, Jun Heng
Published: (2025)
UUM Network Traffic Analysis and Users' Website Preferences
by: Al-Kawaz, Mustafa Mohammed Ibrahim
Published: (2012)
by: Al-Kawaz, Mustafa Mohammed Ibrahim
Published: (2012)
Phishing Detection With Identity Keywords and Target Domain Name
by: Tan, Colin Choon Lin
Published: (2015)
by: Tan, Colin Choon Lin
Published: (2015)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
Phish website detection model using hybrid machine learning and recursive feature subset selection algorithms
by: Al-Mashaykhy, Hiba Zuhair Zeydan
Published: (2025)
by: Al-Mashaykhy, Hiba Zuhair Zeydan
Published: (2025)
Colour Transformation Algorithm On Website Images
For The Colour Blind Users
by: Ching, Siew Li
Published: (2010)
by: Ching, Siew Li
Published: (2010)
Anti-phishing model for phishing websites detection: using pruning decision tree
by: Ahmed I. M. Abunadi
Published: (2025)
by: Ahmed I. M. Abunadi
Published: (2025)
User centered approach for designing a travel website for the elderly / Sumathi a/p Balakrishnan
by: Balakrishnan, Sumathi
Published: (2008)
by: Balakrishnan, Sumathi
Published: (2008)
Phishdentity : Leverage Website Favicon to Offset Phishing Website
by: Choo, Jeffrey Soon Fatt
Published: (2015)
by: Choo, Jeffrey Soon Fatt
Published: (2015)
Initial Trust Antecedents Leading To
Purchasing Intention In B2c
E-Commerce Websites
by: Aris, Aszifa
Published: (2016)
by: Aris, Aszifa
Published: (2016)
Comparative study of machine learning algorithms in website phishing detection
by: Almukhammed Kalybayev
Published: (2025)
by: Almukhammed Kalybayev
Published: (2025)
Classification of phishing websites using machine learning techniques
by: Hadi Zamani
Published: (2025)
by: Hadi Zamani
Published: (2025)
The study of visual interface aesthetics in educational website Kansei engineering approach
by: Nur Faraha Hj. Mohd. Naim
Published: (2016)
by: Nur Faraha Hj. Mohd. Naim
Published: (2016)
An enhanced android botnet detection approach using feature refinement
by: Anwar, Shahid
Published: (2019)
by: Anwar, Shahid
Published: (2019)
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
by: YAN, ZUO
Published: (2025)
by: YAN, ZUO
Published: (2025)
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
by: Puriwat, Lertkrai
Published: (2012)
by: Puriwat, Lertkrai
Published: (2012)
Detecting Semantically Similar Constructs using Google Trigram Sentence Similarity Measures
by: Wong, Linda Lin Juan
Published: (2018)
by: Wong, Linda Lin Juan
Published: (2018)
Gender dependent word-level emotion detection using global spectral speech features
by: Siddique, Haris
Published: (2015)
by: Siddique, Haris
Published: (2015)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Detecting Arabic terrorism messages on twitter using machine learning / Alharbi Norah Muteb S
by: Alharbi, Norah Muteb S
Published: (2019)
by: Alharbi, Norah Muteb S
Published: (2019)
Spectrogram based Anomaly Detection Scheme for Internet-of-Things using Deep Convolutional Neural Network
by: Zeeshan, Ahmad
Published: (2023)
by: Zeeshan, Ahmad
Published: (2023)
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
by: Ghulam , Murtaza
Published: (2021)
by: Ghulam , Murtaza
Published: (2021)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
by: Seyed Asadollah, Abdiesfandani
Published: (2016)
Dictionary-based diabetes distress detection mechanism using facebook reactions / Marian Cynthia Martin
by: Marian Cynthia , Martin
Published: (2020)
by: Marian Cynthia , Martin
Published: (2020)
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
A Cooperative Multi-Agent Approach for Aerial Image Rectification
by: Liew, Lee Hung
Published: (2019)
by: Liew, Lee Hung
Published: (2019)
A hyperbolic sarcasm detection model using negative sentiment tweets and machine learning algorithms / Vithyatheri Govindan
by: Vithyatheri , Govindan
Published: (2024)
by: Vithyatheri , Govindan
Published: (2024)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
Hybrid intelligent approach for network intrusion detection
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
A malware risk analysis and detection system for mobile devices using permission-based features / Mohd Faizal Ab Razak
by: Mohd Faizal , Ab Razak
Published: (2018)
by: Mohd Faizal , Ab Razak
Published: (2018)
A new multi-frames watermarking technique for tamper detection and recovery
by: Khor, Hui Liang
Published: (2017)
by: Khor, Hui Liang
Published: (2017)
Development of Deep Learning Classification Model for Diabetic Retinopathy Detection and Grading
by: Nurul Mirza Afiqah, Tajudin
Published: (2023)
by: Nurul Mirza Afiqah, Tajudin
Published: (2023)
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
by: Bian, Hui
Published: (2025)
by: Bian, Hui
Published: (2025)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
A fuzzy approach for early human action detection / Ekta Vats
by: Ekta, Vats
Published: (2016)
by: Ekta, Vats
Published: (2016)
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
by: Henry Friday , Nweke
Published: (2019)
by: Henry Friday , Nweke
Published: (2019)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
Adaptive global reasoning with multiple knowledge graphs for object detection / Tao Bo
by: Tao , Bo
Published: (2021)
by: Tao , Bo
Published: (2021)
Similar Items
-
Leveraging Ensemble Strategies in Identity Verification and Feature Optimisation for Phishing Website Detection
by: Tan, Colin Choon Lin
Published: (2021) -
Phishing website detection using random forest algorithm
by: Chiang, Jun Heng
Published: (2025) -
UUM Network Traffic Analysis and Users' Website Preferences
by: Al-Kawaz, Mustafa Mohammed Ibrahim
Published: (2012) -
Phishing Detection With Identity Keywords and Target Domain Name
by: Tan, Colin Choon Lin
Published: (2015) -
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)