[1] Anti-Phishing Working Group Phishing Activity Trends
Reports [EB/OL] [2025-04-02].
https://apwg.org/trendsreports.
[2] Lin Y, Liu R, Divakaran D M, et al. Phishpedia: A hybrid
deep learning based approach to visually identify phishing
webpages[C]//30th USENIX Security Symposium
(USENIX Security 21). 2021: 3793-3810.
[3] Liu R, Lin Y, Yang X, et al. Inferring phishing intention
via webpage appearance and dynamics: A deep visionbased approach[C]//31st USENIX Security Symposium
(USENIX Security 22). 2022: 1633-1650.
[4] Liu R, Lin Y, Zhang Y, et al. Knowledge Expansion and
Counterfactual Interaction for {Reference-Based}
Phishing Detection[C]//32nd USENIX Security
Symposium (USENIX Security 23). 2023: 4139-4156.
[5] Liu R, Lin Y, Teoh X, et al. Less defined knowledge and
more true alarms: Reference-based phishing detection
without a pre-defined reference list[C]//33rd USENIX
Security Symposium (USENIX Security 24). 2024:
523-540.
[6] Li Y, Huang C, Deng S, et al. {KnowPhish}: Large
Language Models Meet Multimodal Knowledge Graphs
for Enhancing {Reference-Based} Phishing
Detection[C]//33rd USENIX Security Symposium
(USENIX Security 24). 2024: 793-810.
[7] Lewis P, Perez E, Piktus A, et al. Retrieval-augmented
generation for knowledge-intensive nlp tasks[J]. Advances
in neural information processing systems, 2020, 33:
9459-9474.
[8] VirusTotal-Home[EB/OL]. [2025-04-02].
https://www.virustotal.com/gui/home/upload
[9] Microsoft SmartScreen[EB/OL]. (2024-07-10)
[2025-04-02].
https://learn.microsoft.com/en-us/windows/security/operat
ing-system-security/virus-and-threat-protection/microsoftdefender-smartscreen/
[10] Google Safe Browsing[EB/OL]. [2025-04-02].
https://safebrowsing.google.com
[11] 张震,张三峰,杨望.基于图对比学习的恶意域名检测方
法 [J]. 软 件 学 报 , 2024,
000(10):22.DOI:10.13328/j.cnki.jos.006964.
Zhang Z, Zhang SF, Yang W. Malicious Domain Name
Detection Method Based on Graph Contrastive
Learning[J]. Journal of Software, 2024, 000(10):22.
DOI:10.13328/j.cnki.jos.006964.
[12] 靳婕靖,张永斌,冉崇善.错拼抢注域名研究综述[J]. 计算
机工程,doi: 10.3969/j.issn.1000-3428.2018.03.027.
Jin Jiejing, Zhang Yongbin, Ran Chongshan. Research
Survey on Typosquatting Domain Names[J]. Computer
Engineering, doi: 10.3969/j.issn.1000 - 3428.2018.03.027.
[13] Kim T, Park N, Hong J, et al. Phishing url detection: A
network-based approach robust to
evasion[C]//Proceedings of the 2022 ACM SIGSAC
Conference on Computer and Communications Security.
2022: 1769-1782.
[14] Guo B, Zhang Y, Xu C, et al. HinPhish: An effective
phishing detection approach based on heterogeneous
information networks[J]. Applied Sciences, 2021, 11(20):
9733.
[15] 金建栋,黄正,胡占宇,等.基于智能体工作流的高级钓鱼
邮件检测方法[J].通信学报,2024,45(S2):59-68.
Jin Jiandong, Huang Zheng, Hu Zhanyu, et al. Advanced
Phishing Email Detection Method Based on Agent
Workflow[J]. Journal on Communications, 2024, 45(S2):
59 - 68.
[16] Tan C C L, Chiew K L, Yong K S C, et al. Hybrid
phishing detection using joint visual and textual identity[J].
Expert systems with applications, 2023, 220: 119723.
[17] He B, Chen Y, Chen Z, et al. Txphishscope: Towards
detecting and understanding transaction-based phishing on
ethereum[C]//Proceedings of the 2023 ACM SIGSAC
Conference on Computer and Communications Security.
2023: 120-134.
[18] Kondracki B, Azad B A, Starov O, et al. Catching
transparent phish: Analyzing and detecting mitm phishing
toolkits[C]//Proceedings of the 2021 ACM SIGSAC
Conference on Computer and Communications Security.
2021: 36-50.
[19] Zhang P, Oest A, Cho H, et al. Crawlphish: Large-scale
analysis of client-side cloaking techniques in
phishing[C]//2021 IEEE Symposium on Security and
Privacy (SP). IEEE, 2021: 1109-1124.
[20] Roy S S, Thota P, Naragam K V, et al. From chatbots to
phishbots?: Phishing scam generation in commercial large
language models[C]//2024 IEEE Symposium on Security
and Privacy (SP). IEEE, 2024: 36-54.
[21] Wikipedia[EB/OL]. [2025-04-02].
https://www.wikipedia.org/
[22] Pochat V L, Van Goethem T, Tajalizadehkhoob S, et al.
Tranco: A research-oriented top sites ranking hardened
against manipulation[J]. arXiv preprint arXiv:1806.01156,
2018.
[23] Phishtank[EB/OL]. [2025-04-02]. https://phishtank.com
[24] Openphish[EB/OL]. [2025-04-02]. https://openphish.com
[25] Alexa[EB/OL]. [2025-04-02].
https://www.alexa.com/topsites
[26] Es S, James J, Anke L E, et al. Ragas: Automated
evaluation of retrieval augmented
generation[C]//Proceedings of the 18th Conference of the
European Chapter of the Association for Computational
Linguistics: System Demonstrations. 2024: 150-158.
|