• 대한전기학회
Mobile QR Code QR CODE : The Transactions of the Korean Institute of Electrical Engineers
  • COPE
  • kcse
  • 한국과학기술단체총연합회
  • 한국학술지인용색인
  • Scopus
  • crossref
  • orcid

References

1 
G. Sonowal, K. S. Kuppusamy, 2018, SmiDCA: An Anti- Smishing Model with Machine Learning Approach, The Computer Journal, pp. 1143-1157DOI
2 
M. Moghimi, A. Y. Varjani, 2016, New rule-based phishing detection method, Expert systems with applicationsDOI
3 
O. K. Sahingoz, 2019, Machine learning based phishing detection from URLs, Expert System with Applications, pp. 345-357DOI
4 
M. Darling, 2015, A lexical Approach for Classifying Malicious URLs, In 2015 IEEE International Conference on High Performance Computing & Simulation (HPCS), pp. 19-202DOI
5 
P. Prakash, , PhishNet: predictive blacklisting to detect phishing attacks, March 2010.DOI
6 
B. Sun, 2015, AutoBLG: Automatic URL blacklist generator using search space expansion and filters, In 2015 IEEE Symposium on Computers and Communication(ISCC)DOI
7 
R. B. Basnet, 2011, Rule-based phishing attack detection, In Proceedings of the International conference on security and managementGoogle Search
8 
A. K. Jain, B. B. Gupta, 2018, Rule-based framework for detec- tion of smishing messages in mobile environment, Procedia Computer ScienceDOI
9 
Y. G. Yoon, I. H. Choi, J. B. Goo, J. A. Son, T. K. Oh, Oct 2019, Application of Machine Learning Technique for Damage Assessment of Porcelain Insulator, In proceedings of Society of Electrophysics & Application, KIEE, pp. 88-89Google Search
10 
Wei-Hong WANG, V. Yin-Jun L., Hui-Bing CHEN, Zhao-Lin FANG, 2013, A Static Malicious Javascript Detection Using SVM, In proceedings of the 2nd International Conference on Computer Science and Electronics Engineering(ICCSEE)DOI
11 
H. Kim, J. H. Huh, 2011, Detecting DNS-poisoning-based phishing attacks from their network performance characteristics, Electronics Letters, Vol. 47, No. 11, pp. 656-658DOI
12 
Y. Liao, V. R. Vemuri, 2002, Use of K-Nearest Neighbor classi- fier for intrusion detection, Computer&Security, Vol. 21, No. 5, pp. 439-448DOI
13 
, https://gs.statcounter.com
14 
, https://www.alexa.com
15 
, http://phishtank.org/index.php