LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
Tài liệu tham khảo
Alsarnouby, 2015, Why phishing still works: user strategies for combating phishing attacks, Int. Journal of Human-Computer Studies, 82
Asudeh, 2016, POSTER: phishing Website Detection with a Multiphase Framework to Find Visual Similarity
APWG, Phishing activity trends paper. [Online]. Available at http://www/antiphishing.org/resources/apwg-papers/, 2018.
Bay, 2008, "Speeded-up robust features (SURF), Computer vision and image understanding, vol.110, 346, 10.1016/j.cviu.2007.09.014
Bianco, 2017, Deep learning for logo recognition, Neurocomputing, 5, 23, 10.1016/j.neucom.2017.03.051
Bozkir, 2016, Use of HOG Descriptors in Phishing Detection
Chen, 2009, Fighting Phishing with Discriminative Keypoint Features, IEEE Computer Society
Chiew, 2015, Utilization of Website Logo for Phishing Detection, Computers & Security, 54, 16, 10.1016/j.cose.2015.07.006
Common Object in Context (COCO) Dataset, [Online], Available at http://cocodataset.org/#home, 2020.
Corona, 2017, DeltaPhish: detecting Phishing Webpages in Compromised Websites, In European Symposium on Research in Computer Security, 370
Dalal, 2005, Histogram of Oriented Gradients for Human Detection, Computer Vision and Pattern Recognition
Dalgic, 2018, Phish-IRIS: a New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors
Dhamija, 2006, Why phishing works?, 581
Dunlop, 2010, GoldPhish: using images for content-based phishing analysis
Felzenszwalb, 2010, Object Detection with Discriminatively Trained Part Based Models, IEEE Trans Pattern Anal Mach Intell, 32, 10.1109/TPAMI.2009.167
Firefox Browser, [Online], Available at https://www.mozilla.org, 2020.
Fu, 2006, Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD), IEEE Trans Dependable Secure Comput, 3, 10.1109/TDSC.2006.50
Geng, 2015, Combatting phishing attacks via brand identity and authorization features, Security and Communication Networks, 8, 888, 10.1002/sec.1045
Girshick, R., Donahue, J., Darrell, T., Malik, J., 2013. “Rich feature hierarchies for accurate object detection and semantic segmentation”, arXiv:1311.2524.
Girshick, 2015, Fast R-CNN
Google Chrome Browser, [Online], Available at https://www.google.com/chrome/, 2020.
He, K., Gkioxari, G., Dollar, P., Girshick, R., 2017. “Mask R-CNN”, arXiv:1703.06870.
Imran, 2017, A comparison of feature extraction tecnique for malware analysis, Turkish Journal of Electrical Engineering & Computer Sciences, 25, 1173, 10.3906/elk-1601-189
Indola, F.N., Shen, A., Gao, P., Keutzer, K., 2015. “DeepLogo: hitting Logo Recognition with the Deep Neural Network Hammer”, arXiv:1510.02131.
Jain, 2017, Phishing Detection: analysis of Visual Similarity Based Approaches, Security and Communication Networks, 10.1155/2017/5421046
Jain, 2018, “Detection of phishing attacks in financial and e-banking websites using link and visual similarity, International Journal of Information and Computer Security, 10, 398, 10.1504/IJICS.2018.095303
Kauser, 2014, Hybrid client side phishing website detection approach, International Journal of Advanced Computer Science andd Applications, 5, 132
King, 2009, Dlib-ml: a machine learning toolkit, International Journal of Machine Learning Research, 10, 1755
King, D.E., 2015. “Max-Margin Object Detection,” arXiv:1502.0046v1.
LabelImg Tool, [Online], Available at https://github.com/tzutalin/labelImg, 2020.
Lam, 2009, Counteracting Phishing Page Polymorphism: an Image Layout Analysis Approach
Lazebnik, 2006, Beyond bags of features: spatial pyramid matching for recognizing natural scene categories, In Computer Vision and Pattern Recognition (CVPR)
Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed,S., Fu, C-Y. Berg, A.C., 2015. “SSD: single Shot MultiBox Detector” arXiv:1512.02325.
Liang, 2015, Moving object classification using local shape and HOG features in wavelet-transformed space with hierachical SVM classifers, Appl Soft Comput, 28, 10.1016/j.asoc.2014.09.051
Lin, T.Y., Goyal, P., Girschik, R., He, K., Dollar, P., 2017. “Focal loss for Dense Object Detection”, arXiv:1708.02002.
Llorca, 2013, Vehicle logo recognition in traffic images using HOG Features and SVM
Lowe, 2004, Distinctive Image Features from Scale-Invariant Keypoints, Int J Comput Vis, vol.50, 91, 10.1023/B:VISI.0000029664.99615.94
Mao, 2017, Phishing-Alarm: robust and efficient phishing detection via page component similarity, IEEE Access, 5, 17020, 10.1109/ACCESS.2017.2743528
Moghimi, 2016, New rule-based phishing detection method, Expert Systems with Applications, 53, 231, 10.1016/j.eswa.2016.01.028
Moore, 2007, Examining the Impact of Website Take-down on Phishing
OpenCV, [Online], Available at http://opencv.org/, 2020.
Oliveira, 2016, Automatic Graphic Logo Detection via Fast Region-based Convolutional Networks, In IJCNN 2016
Pascal VOC Dataset, [Online], Available at http://host.robots.ox.ac.uk/pascal/VOC/, 2019.
Phishtank, [Online]. Available at https://www.phishtank.com/, 2020a.
Phishbank, [Online]. Available at https://phishbank.org/, 2020b.
Ramanathan, 2012, phishGILLNET – phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training, EURASIP Journal on Information Security, 10.1186/1687-417X-2012-1
Rao, 2015, PhishShield: a Desktop Application to Detect Phishing Webpages through Heuristic Approach, Procedia Comput Sci, 54, 147, 10.1016/j.procs.2015.06.017
Redmon, J., Divvala, S., Girshick, R., Farhadi, A., 2015. “You Only Look Once: unified, Real-Time Object Detection”, arXiv:1506.02640.
Ren, S., He, K., Girshick, R., Sun, J., 2015. “Faster R-CNN: towards Real-Time Object Detection with Region Proposal Networks”, arXiv:1506.01497.
Rosiello, 2007, A layout–similarity–based approach for detecting phishing pages
Sathish, 2015, Phishing Webpage Detection for Secure Online Transactions, International Journal of Computer Science and Network Security, 15
Sheng, 2009, An emprical analysis of phishing black-lists
Shirazi, H., Bezawada, B., Ray, I., Anderson C., “Adversarial Sampling Attacks Against Phishing Detection”, arXiv:1805.12177v2, 2019.
Su, H., Gong, S., Zhu, X., 2018. “Scalable Deep Learning Logo Detection”, arXiv:1803.11417.
The-Chung, 2014, An anti-phishing system employing diffused information, ACM Transaction on Information and System Security, 16, 1, 10.1145/2584680
Uijlings, 2013, Selective Search for Object Recognition, Int J Comput Vis, 104, 154, 10.1007/s11263-013-0620-5
Varshney, 2016, A survey and classification of web phishing detection schemes, Security and Communication Networks, 9, 6266, 10.1002/sec.1674
Wang, G., Liu, H., Becerra, S., Wang, K. “Verilogo: proactive Phishing Detection via Logo Recognition,” Technical Report CS2011-0669, UC San Diego, 2011.
Xiang, 2011, CANTINA+: a feature-rich machine learning framework for detecting phishing web sites, ACM Transactions on Information and System Security, 14, 10.1145/2019599.2019606
Xiang, 2013