A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
To the best of our knowledge, this is the first study to connect the phishing landscape using blacklisted phishing URLs from PhishTank, URL statistics from bit.ly and cues from Twitter to track the impact ... Although the research community and industry has been developing techniques to identify phishing attacks through emails and instant messaging (IM), there is very little research done, that provides a deeper ... Acknowledgments The authors would like to thank JW Lim, moderator at PhishTank who shared the PhishTank URLs with us. ...doi:10.1145/2030376.2030387 dblp:conf/ceas/ChhabraABK11 fatcat:aopy2qpdk5gtnjv3xex4lwlcb4
The study is focussed on microblogging, the applicability of the approach to other media is not considered. ... any format or medium without the formal permission of the copyright holders. ... Phi.sh/$oCiaL: The phishing landscape through short URLs 2011 ACM International Conference Proceeding Series 92 101 74 Chi F., Yang N. ...doi:10.1108/jd-03-2012-0027 fatcat:3rfuptki5bgxvfxumtf6ea6vxi