This HTML5 document contains 32 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20doi:10.1007/
dctermshttp://purl.org/dc/terms/
n5https://kar.kent.ac.uk/id/eprint/75746#
n11https://kar.kent.ac.uk/75746/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n12http://purl.org/ontology/bibo/status/
n17https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n22https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n8http://eprints.org/ontology/
n15https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n18https://kar.kent.ac.uk/id/publication/
n21https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n9https://kar.kent.ac.uk/id/document/
n16https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n7https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n14https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:75746
rdf:type
bibo:Article n8:EPrint n8:ConferenceItemEPrint bibo:AcademicArticle
rdfs:seeAlso
n11:
owl:sameAs
n20:978-3-030-39303-8_17
n8:hasAccepted
n9:3183853
n8:hasDocument
n9:3183914 n9:3183915 n9:3183916 n9:3183853 n9:3183858 n9:3183913
dc:hasVersion
n9:3183853
dcterms:title
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)
wdrs:describedby
n7:export_kar_RDFN3.n3 n22:export_kar_RDFN3.n3
dcterms:date
2020-01-25
dcterms:creator
n14:ext-46b7b154602f08aeccb351f03ddcbffc n14:ext-d07f701818a5b81ce3d7c02a26121cbe n14:ext-j.r.c.nurse@kent.ac.uk
bibo:status
n12:peerReviewed n12:published
dcterms:publisher
n21:ext-1c5ddec173ca8cdfba8b274309638579
bibo:abstract
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites. In order to defend against such attacks, there is an urgent need for automated mechanisms to identify this malevolent content before it reaches users. Machine learning techniques have gradually become the standard for such classification problems. However, identifying common measurable features of phishing content (e.g., in emails) is notoriously difficult. To address this problem, we engage in a novel study into a phishing content classifier based on a recurrent neural network (RNN), which identifies such features without human input. At this stage, we scope our research to emails, but our approach can be extended to apply to websites. Our results show that the proposed system outperforms state-of-the-art tools. Furthermore, our classifier is efficient and takes into account only the text and, in particular, the textual structure of the email. Since these features are rarely considered in email classification, we argue that our classifier can complement existing classifiers with high information gain.
dcterms:isPartOf
n16:repository n18:ext-03029743
dcterms:subject
n17:T n17:QA
bibo:authorList
n5:authors
bibo:presentedAt
n15:ext-11203b8da5807ece3c4ba774edee55dd
bibo:volume
11897