Skip to main content

Showing 1–1 of 1 results for author: Qbeitah, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.09789  [pdf, other

    cs.CR

    PhishOut: Effective Phishing Detection Using Selected Features

    Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi

    Abstract: Phishing emails are the first step for many of today's attacks. They come with a simple hyperlink, request for action or a full replica of an existing service or website. The goal is generally to trick the user to voluntarily give away his sensitive information such as login credentials. Many approaches and applications have been proposed and developed to catch and filter phishing emails. However,… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: 2020 27th International Conference on Telecommunications (ICT), p. 5, Kuta, Bali