A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Why there aren't more information security research studies
Information and Management
Phishing Attacks Rising, But Dollar Losses Down
IEEE Security and Privacy
Computers and Operations Research
Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Communications of the ACM - Supporting exploratory search
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Expert Systems with Applications: An International Journal
Learning to detect phishing emails
Proceedings of the 16th international conference on World Wide Web
Journal of Management Information Systems
Communications of the ACM
Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security
FSKD '07 Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Volume 04
A framework for detection and measurement of phishing attacks
Proceedings of the 2007 ACM workshop on Recurring malcode
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Journal of the American Society for Information Science and Technology
On the Effectiveness of Techniques to Detect Phishing Sites
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
IEEE Security and Privacy
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
International Journal of Electronic Commerce
E-Mail Classification for Phishing Defense
ECIR '09 Proceedings of the 31th European Conference on IR Research on Advances in Information Retrieval
School of phish: a real-world evaluation of anti-phishing training
Proceedings of the 5th Symposium on Usable Privacy and Security
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Discovering company revenue relations from news: A network approach
Decision Support Systems
Phish and HIPs: human interactive proofs to detect phishing attacks
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Random-Forests-Based Network Intrusion Detection Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
An integrative study of information systems security effectiveness
International Journal of Information Management: The Journal for Information Professionals
Expert Systems with Applications: An International Journal
Enhancing financial performance with social media: An impression management perspective
Decision Support Systems
International Journal of Hybrid Intelligent Systems
Hi-index | 0.00 |
Phishing is an online crime that increasingly plagues firms and their consumers. We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value suffered by the targeted firms. We analyze 1030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid method that predicts the severity of the attack with up to 89% accuracy using text phrase extraction and supervised classification. Our research identifies some important textual and financial variables that impact the severity of the attacks and potential financial loss.