Open Access
| Issue |
ITM Web Conf.
Volume 85, 2026
Intelligent Systems for a Sustainable Future (ISSF 2026)
|
|
|---|---|---|
| Article Number | 03013 | |
| Number of page(s) | 6 | |
| Section | Data Science, IoT, Optimization & Predictive Analytics | |
| DOI | https://doi.org/10.1051/itmconf/20268503013 | |
| Published online | 09 April 2026 | |
- A. Jain and B. Gupta, "Phishing detection: Analysis of visual similarity based approaches," Journal of Information Security and Applications, vol. 36, pp. 68–81, 2017. [Google Scholar]
- Y. Alsharnouby, F. Alaca, and S. Chiasson, "Why phishing still works: User strategies for combating phishing attacks," International Journal of Human-Computer Studies, vol. 82, pp. 69–82, 2015. [Google Scholar]
- D. Bojinov, E. Bursztein, D. Boneh, and P. Bursztein, "Using behavioral biometrics for continuous authentication in real-world settings," in Proc. IEEE Security and Privacy Workshops, 2014, pp. 187–193. [Google Scholar]
- J. Acien, A. Morales, R. Vera-Rodriguez, J. Fierrez, and R. Tolosana, "BeCAPTCHA: Behavioral bot detection via mouse dynamics," arXiv preprint arXiv:2005.13655, 2020. [Google Scholar]
- S. Kumar, A. Arora, and R. Sharma, "Hybrid anomaly detection using mouse and keystroke dynamics for phishing prevention," International Journal of Cybersecurity and Digital Forensics, vol. 11, no. 2, pp. 77–87, 2022. [Google Scholar]
- L. F. Cranor, "Security warning fatigue: A case study," in Proc. 26th Annual Computer Security Applications Conference (ACSAC), 2016, pp. 121–130. [Google Scholar]
- Bhad, "Behavioral biometrics in preventing identity fraud," Master's thesis, Dept. Comput. Sci., Univ. Oxford, Oxford, U.K., 2025. [Google Scholar]
- S. Chiasson, P. C. van Oorschot, and R. Biddle, "A usability study and critique of two phishing user studies," in Proc. 15th USENIX Security Symposium, 2006, pp. 1–14. [Google Scholar]
- C. Whittaker, B. Ryner, and M. Nazif, "Large-scale automatic classification of phishing pages," in Proc. Network and Distributed System Security Symposium (NDSS), 2010. [Google Scholar]
- K. Snow and F. Calabrese, "Behavioral fingerprinting for intrusion detection," in Proc. IEEE Conference on Communications and Network Security (CNS), 2014, pp. 493–498. [Google Scholar]
- A. Moghimi, A. B. Nassif, and R. M. A. Abdullah, "Machine learning for detecting social engineering attacks: A review," IEEE Access, vol. 10, pp. 12098–12115, 2022. [Google Scholar]
- A. Aleroud and L. Zhou, "Phishing environments, techniques, and countermeasures: A survey," Computers & Security, vol. 68, pp. 160–196, 2017. [Google Scholar]
- M. Jakobsson and S. Myers, Phishing and Counter-measures: Understanding the Increasing Problem of Electronic Identity Theft. Hoboken, NJ, USA: Wiley-Interscience, 2006. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

