KIEE
The Transactions of
the Korean Institute of Electrical Engineers
KIEE
Contact
Open Access
Monthly
ISSN : 1975-8359 (Print)
ISSN : 2287-4364 (Online)
http://www.tkiee.org/kiee
Mobile QR Code
The Transactions of the Korean Institute of Electrical Engineers
ISO Journal Title
Trans. Korean. Inst. Elect. Eng.
Main Menu
Main Menu
최근호
Current Issue
저널소개
About Journal
논문집
Journal Archive
편집위원회
Editorial Board
윤리강령
Ethics Code
논문투고안내
Instructions to Authors
연락처
Contact Info
논문투고·심사
Submission & Review
Journal Search
Home
Archive
2021-01
(Vol.70 No.1)
10.5370/KIEE.2021.70.1.114
Journal XML
XML
PDF
INFO
REF
References
1
G. Sonowal, K. S. Kuppusamy, 2018, SmiDCA: An Anti- Smishing Model with Machine Learning Approach, The Computer Journal, pp. 1143-1157
2
M. Moghimi, A. Y. Varjani, 2016, New rule-based phishing detection method, Expert systems with applications
3
O. K. Sahingoz, 2019, Machine learning based phishing detection from URLs, Expert System with Applications, pp. 345-357
4
M. Darling, 2015, A lexical Approach for Classifying Malicious URLs, In 2015 IEEE International Conference on High Performance Computing & Simulation (HPCS), pp. 19-202
5
P. Prakash, , PhishNet: predictive blacklisting to detect phishing attacks, March 2010.
6
B. Sun, 2015, AutoBLG: Automatic URL blacklist generator using search space expansion and filters, In 2015 IEEE Symposium on Computers and Communication(ISCC)
7
R. B. Basnet, 2011, Rule-based phishing attack detection, In Proceedings of the International conference on security and management
8
A. K. Jain, B. B. Gupta, 2018, Rule-based framework for detec- tion of smishing messages in mobile environment, Procedia Computer Science
9
Y. G. Yoon, I. H. Choi, J. B. Goo, J. A. Son, T. K. Oh, Oct 2019, Application of Machine Learning Technique for Damage Assessment of Porcelain Insulator, In proceedings of Society of Electrophysics & Application, KIEE, pp. 88-89
10
Wei-Hong WANG, V. Yin-Jun L., Hui-Bing CHEN, Zhao-Lin FANG, 2013, A Static Malicious Javascript Detection Using SVM, In proceedings of the 2nd International Conference on Computer Science and Electronics Engineering(ICCSEE)
11
H. Kim, J. H. Huh, 2011, Detecting DNS-poisoning-based phishing attacks from their network performance characteristics, Electronics Letters, Vol. 47, No. 11, pp. 656-658
12
Y. Liao, V. R. Vemuri, 2002, Use of K-Nearest Neighbor classi- fier for intrusion detection, Computer&Security, Vol. 21, No. 5, pp. 439-448
13
, https://gs.statcounter.com
14
, https://www.alexa.com
15
, http://phishtank.org/index.php