User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 1
 Views 2
A Description Logic Ontology for Email Phishing
2020
Journal:  
International Journal of Information Security Science
Author:  
Abstract:

Phishing detection is an area of identifying malicious activities designed by phishers to lure users providing sensitive information. Existing anti-phishing systems use blacklists based on specific parameters, characterize attacker’s activities with artificial and computational approaches and educate users. The development and maintenance of these systems is hard and costly because of the polymorphic nature of phishing techniques. Phishing attacks are able to scam humans with insufficient knowledge, while countermeasures focus on specific characteristics to make decisions. Defining formal approaches for representing and reasoning knowledge in anti-phishing systems is therefore a concern. This work deals with this issue by proposing formalized description logic to build the knowledge base of phishing attacks. It additionally designs an ontology-oriented approach to add semantics on that knowledge. The ontology model has been proven consistent and satisfiable. Experimentations on case studies demonstrate the ability of the proposed model to represent knowledge attack scenarios. A comparison with state-of-the-art researches shows that the proposed formalism is more adequate to characterize phishing semantics. This work could successfully complement anti-phishing systems.

Keywords:

0
2020
Author:  
Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles








International Journal of Information Security Science

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 62
Cite : 6
International Journal of Information Security Science