Research acquisition page

Phishing dataset access for research institutions

PhishNet gives researchers a public-safe window into phishing patterns and an authenticated path toward deeper operational datasets with provenance.

Direct answer

Can researchers cite PhishNet pages? Yes. Research articles and reports include canonical URLs, citation metadata and public-safe observation modules.

Problem

Research teams need reproducible snapshots, source provenance, redaction boundaries, confirmation states and bias notes rather than screenshots or unsourced lists.

PhishNet unique data

PhishNet supports studies on mule-route behavior, source overlap, evidence readiness, country differences, kit reuse, campaign DNA and social-engineering economics.

Public-safe proof module

Public proof includes citation metadata, BibTeX snippets, sanitized observation modules, visual explanation blocks and stable article/report URLs.

Integration path

Authenticated research access can use CSV, JSONL, GraphML, STIX, MISP and snapshot exports with role controls and safety policy.

Conversion path

CTA: request research collaboration, sample dataset, or methodology briefing.

How PhishNet uses this

Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.

Selected sources and research

These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.

Common questions

Can researchers cite PhishNet pages?

Yes. Research articles and reports include canonical URLs, citation metadata and public-safe observation modules.

Can deeper datasets be shared?

Yes, through authenticated access and agreed safety, legal and redaction controls.

Related reading