Citations in impact factor journals
Improved thermal energy discharge rate from a temperature-controlled heating source in a natural draft chimney Applied Thermal Engineering |
Fabrication and efficacy evaluation of chloroquine nanoparticles in CFA-induced arthritic rats using TNF-α ELISA European Journal of Pharmaceutical Sciences |
Reclaiming salt-affected soils using electro-remediation technology: PCPSS evaluation Electrochimica Acta |
New Rule-Based Phishing Detection Method Expert Systems with Applications |
Intelligent Web-Phishing Detection and Protection Scheme using
integrated Features of Images, Frames and Text Expert Systems with Applications |
3D printing in pharmaceutics: A new tool for designing customized drug delivery systems International Journal of Pharmaceutics Vol. 499, Issue 1-2, 376, 2016 |
Polyporus squamosus (Huds.) Fr from different origins: Chemical characterization, screening of the bioactive properties and specific antimicrobial effects against Pseudomonas aeruginosa LWT - Food Science and Technology |
Solar photovoltaic water pumping system - A comprehensive review Renewable and Sustainable Energy Reviews |
A review on paddy residue based power generation: Energy, environment and economic perspective Renewable and Sustainable Energy Reviews |
Evaluation of phenolic compound, antioxidant activities and antioxidant enzymes of barberry genotypes in Iran Scientia Horticulturae |
Prevalence, Antimicrobial Resistance and Serotype Distribution of Listeria monocytogenes
Isolated from Raw Milk and Dairy Products Journal of Food Safety Vol. 36, Issue 1, 11, 2016 |
Determination of Shelf Life for Sausages Produced From Some Freshwater Fish Using Two Different Smoking Methods Journal of Food Safety Vol. 36, Issue 1, 69, 2016 |
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks Security and Communication Networks |
Citation to this article as recorded by
Huang, H., Y. Wang, L. Xie and L. Jiang, 2013. An active anti-phishing solution based on semi-fragile watermark. Inform. Technol. J., 12: 198-203. CrossRefDirect Link |
Citation to this article as recorded by
Machine Intelligence and Big Data Analytics for Cybersecurity Applications Studies in Computational Intelligence |
Applications of Evolutionary Computation Lecture Notes in Computer Science |
ICCCE 2020 Lecture Notes in Electrical Engineering |
Machine Intelligence and Smart Systems Algorithms for Intelligent Systems |
Optimization Approaches for Designing Quantum Reversible Arithmetic Logic Unit International Journal of Theoretical Physics Vol. 55, Issue 3, 1423, 2016 |
CBR-PDS: a case-based reasoning phishing detection
system Journal of Ambient Intelligence and Humanized Computing |
CatchPhish: detection of phishing websites by inspecting URLs Journal of Ambient Intelligence and Humanized Computing Vol. 11, Issue 2, 813, 2020 |
Detecting Rumors on Social Media Based on a CNN Deep Learning Technique Arabian Journal for Science and Engineering Vol. 45, Issue 12, 10813, 2020 |
Detecting Phishing SMS Based on Multiple Correlation Algorithms SN Computer Science Vol. 1, Issue 6, , 2020 |
Higher N2O emissions from organic compared to synthetic N fertilisers on sandy soils in a cool temperate climate Agriculture, Ecosystems & Environment |
Microbiology of neonatal septicemia in a tertiary hospital in Benin City, Nigeria Biomarkers and Genomic Medicine Vol. 5, Issue 4, 142, 2013 |
Protective effect of green tea against ovarian and endometrial apoptoses in rats treated with depot medroxyprogesterone acetate Biomarkers and Genomic Medicine Vol. 7, Issue 3, 105, 2015 |
Evaluation of the physicochemical and chlorophyll-a conditions of a subtropical aquaculture in Lake Nasser area, Egypt Beni-Suef University Journal of Basic and Applied Sciences Vol. 4, Issue 4, 327, 2015 |
Preparation of chitosan/polycaprolactam nanofibrous filter paper and its greatly enhanced chromium(VI) adsorption Colloids and Surfaces A: Physicochemical and Engineering Aspects |
Treatment modalities for tuberculosis of the spine: 22 years' experience in east Taiwan Formosan Journal of Surgery Vol. 46, Issue 6, 189, 2013 |
Does mineral sulphur availability account for growth performance, bulb development and metabolically related traits in wild leek (Allium ampeloprasum L.; Alliaceae)? Flora - Morphology, Distribution, Functional Ecology of Plants |
Effect of luteolin on lipid peroxidation and antioxidants in acute and chronic periods of isoproterenol induced myocardial infarction in rats Journal of Acute Medicine Vol. 2, Issue 3, 70, 2012 |
Effect of 70% ethanolic extract of roots of Paeonia officinalis Linn. on hepatotoxicity Journal of Acute Medicine Vol. 3, Issue 2, 45, 2013 |
Antibacterial activity of seed extracts of Callistemon lanceolatus DC on uropathogenic bacteria Journal of Acute Medicine Vol. 4, Issue 1, 6, 2014 |
Renoprotective effect of Tabernaemontana heyneana Wall. leaves against paracetamol-induced renotoxicity in rats and detection of polyphenols by high-performance liquid chromatography–diode array detector–mass spectrometry analysis Journal of Acute Medicine Vol. 4, Issue 2, 57, 2014 |
Assessment of acute and subacute toxic effects of the Saudi folk herb Retama raetam in rats Journal of the Chinese Medical Association Vol. 78, Issue 12, 691, 2015 |
Ocular inserts based on chitosan and brimonidine tartrate: Development, characterization and biocompatibility Journal of Drug Delivery Science and Technology |
Protein enrichment and digestion improvement of napiergrass and pangolagrass with solid-state fermentation Journal of Microbiology, Immunology and Infection Vol. 46, Issue 3, 171, 2013 |
Chronic arsenic exposure and its adverse health effects in Taiwan: A paradigm for management of a global environmental problem The Kaohsiung Journal of Medical Sciences Vol. 27, Issue 9, 411, 2011 |
Potential of D-cycloserine in the treatment of behavioral and neuroinflammatory disorders in Parkinson's disease and studies that need to be performed before clinical trials The Kaohsiung Journal of Medical Sciences Vol. 28, Issue 8, 407, 2012 |
Bacterial colonization of double J stents and bacteriuria frequency The Kaohsiung Journal of Medical Sciences Vol. 29, Issue 12, 658, 2013 |
Detection of Obfuscation in Java Malware Procedia Computer Science |
Using Case-Based Reasoning for Phishing Detection Procedia Computer Science |
Improving Spoofed Website Detection Using Machine Learning Cybernetics and Systems |
Facing the era of smartness – delivering excellent smart hospitality experiences through cloud computing Journal of Hospitality Marketing & Management |
Deep belief network based detection and categorization of
malicious URLs Information Security Journal: A Global Perspective |
Comparison of simple feedforward neural network, recurrent neural network and ensemble neural networks in phishing detection Journal of Physics: Conference Series Vol. 1502, Issue 1, 012033, 2020 |
SmiDCA: An Anti-Smishing Model with Machine Learning
Approach The Computer Journal |
Detection of phishing websites using a novel twofold
ensemble model Journal of Systems and Information Technology |
A hybrid firefly and support vector machine classifier for phishing email detection Kybernetes Vol. 45, Issue 6, 977, 2016 |
Scam Pandemic: How Attackers Exploit Public Fear through Phishing 2020 APWG Symposium on Electronic Crime Research (eCrime) |
Detecting and Classifying Phishing Websites by Machine Learning 2021 3rd International Conference on Applied Machine Learning (ICAML) |
Phishing Emails Detection Using CS-SVM 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) |
Detecting malicious COVID-19 URLs using machine learning techniques 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) |
Ontological Detection of Phishing Emails 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing 2021 IEEE Symposium on Security and Privacy (SP) |
Machine Learning and Nature Inspired Based Phishing Detection: A Literature Survey International Journal on Artificial Intelligence Tools Vol. 28, Issue 05, 1930002, 2019 |
ACRIPPER: A New Associative Classification Based on RIPPER Algorithm Journal of Information & Knowledge Management Vol. 20, Issue 01, 2150013, 2021 |
Leaving All Proxy Server Logs to Paragraph
Vector Journal of Information Processing Vol. 26, Issue 0, 804, 2018 |
Parallel phishing attack recognition using software
agents Journal of Intelligent & Fuzzy Systems |
A fuzzy-weighted approach for malicious web domain identification Journal of Intelligent & Fuzzy Systems |
Semi-supervised learning approach for malicious URL detection via adversarial learning1 Journal of Intelligent & Fuzzy Systems |
How to cite this article
Huajun Huang, Liang Qian and Yaojun Wang, 2012. A SVM-based Technique to Detect Phishing URLs. Information Technology Journal, 11: 921-925.
DOI: 10.3923/itj.2012.921.925
URL: https://scialert.net/abstract/?doi=itj.2012.921.925
DOI: 10.3923/itj.2012.921.925
URL: https://scialert.net/abstract/?doi=itj.2012.921.925