메뉴 건너뛰기




Volumn 13, Issue 2, 2015, Pages 373-380

An introduction to journal phishings and their detection approach

Author keywords

Classification; Data mining; Hijacked journal; Phishing

Indexed keywords

CLASSIFICATION (OF INFORMATION); DATA MINING;

EID: 84932191138     PISSN: 16936930     EISSN: 23029293     Source Type: Journal    
DOI: 10.12928/TELKOMNIKA.v13i2.1436     Document Type: Article
Times cited : (19)

References (26)
  • 1
    • 84932154932 scopus 로고    scopus 로고
    • Prediction of phishing websites using classification algorithms based on weight of web pages characteristics
    • Dadkhah M, Jazi M.D, Lyashenko V. Prediction of phishing websites using classification algorithms based on weight of web pages characteristics. Journal of Mathematics and Technology. 2014; 5(2): 24-35. DOI: 10.7813/jmt.2014/5-2/4.
    • (2014) Journal of Mathematics and Technology , vol.5 , Issue.2 , pp. 24-35
    • Dadkhah, M.1    Jazi, M.D.2    Lyashenko, V.3
  • 3
    • 84865684041 scopus 로고    scopus 로고
    • APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach
    • Mahmood M, Rajamani L. APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach. Global Trends in Computing and Communication Systems. 2012; 269; 490-502.
    • (2012) Global Trends in Computing and Communication Systems , vol.269 , pp. 490-502
    • Mahmood, M.1    Rajamani, L.2
  • 4
    • 72449130877 scopus 로고    scopus 로고
    • A Novel Anti-Phishing Framework Based on Honeypots
    • Tacoma, WA.
    • Li S, Schmitz R. A Novel Anti-Phishing Framework Based on Honeypots. eCrime Researchers Summit (IEEE). Tacoma, WA. 2009; 1-13. DOI:10.1109/ECRIME.2009.5342609.
    • (2009) eCrime Researchers Summit (IEEE) , pp. 1-13
    • Li, S.1    Schmitz, R.2
  • 7
  • 8
    • 84857164924 scopus 로고    scopus 로고
    • Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
    • Schlegel R, Zhang K, Zhou X. Y, Intwala M, Kapadia A, Wang X. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS. 2011; 11: 17-33.
    • (2011) NDSS , vol.11 , pp. 17-33
    • Schlegel, R.1    Zhang, K.2    Zhou, X.Y.3    Intwala, M.4    Kapadia, A.5    Wang, X.6
  • 10
    • 84856033479 scopus 로고    scopus 로고
    • The State of Phishing Attacks
    • Hong J. The State of Phishing Attacks. Communications of the ACM. 2012; 55(1): 74-81.
    • (2012) Communications of the ACM , vol.55 , Issue.1 , pp. 74-81
    • Hong, J.1
  • 22
    • 84896890666 scopus 로고    scopus 로고
    • Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?
    • Jalalian M, Mahboobi H. Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?. Walailak J Sci & Tech. 2014; 11(5): 389-394.
    • (2014) Walailak J Sci & Tech , vol.11 , Issue.5 , pp. 389-394
    • Jalalian, M.1    Mahboobi, H.2
  • 24
    • 84907819333 scopus 로고    scopus 로고
    • Predatory and Fake Scientific Journals/Publishers-A Global Outbreak with Rising Trend: A Review
    • Lukiæ Tin, Blešiæ Ivana, Basarin Biljana, Ivanoviæ Bibiæ Ljubica, Miloševiæ Dragan, Sakulski Dušan. Predatory and Fake Scientific Journals/Publishers-A Global Outbreak with Rising Trend: A Review.Geographica Pannonica. 2014; 18(3): 69-81.
    • (2014) Geographica Pannonica , vol.18 , Issue.3 , pp. 69-81
    • Tin, L.1    Ivana, B.2    Biljana, B.3    Ljubica, I.B.4    Dragan, M.5    Dušan, S.6
  • 25
    • 84872404765 scopus 로고    scopus 로고
    • Open Access Initiatives in Africa-Structure, Incentives and Disincentives
    • Nwagwu WE. Open Access Initiatives in Africa-Structure, Incentives and Disincentives. The Journal of Academic Librarianship. 2013; 39(1): 3-10. DOI: 10.1016/j.acalib.2012.11.024.
    • (2013) The Journal of Academic Librarianship , vol.39 , Issue.1 , pp. 3-10
    • Nwagwu, W.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.