A novel phishing website detection model based on LightGBM and domain name features

J Zhou, H Cui, X Li, W Yang, X Wu - Symmetry, 2023 - mdpi.com
Phishing attacks have evolved in terms of sophistication and have increased in sheer
number in recent years. This has led to corresponding developments in the methods used to …

An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach

S Jamal, H Wimmer, IH Sarker - Security and Privacy, 2024 - Wiley Online Library
Phishing and spam have been a cybersecurity threat with the majority of breaches resulting
from these types of social engineering attacks. Therefore, detection has been a long …

A URL-based social semantic attacks detection with character-aware language model

M Almousa, M Anwar - IEEE Access, 2023 - ieeexplore.ieee.org
Social engineering attacks rely on human errors and behavioral choices. The semantic
attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception …

Characterizing coding style of phishing websites using machine learning techniques

M Almousa, R Furst, M Anwar - 2022 Fourth International …, 2022 - ieeexplore.ieee.org
Social engineering attacks pose a major threat to an internet user's sensitive information,
such as credit card information and passwords. One of the most common of these attacks …

A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)

MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal
sensitive user information. Deep learning techniques, particularly convolutional neural …

ML and DL-based Phishing Website Detection: The Effects of Varied Size Datasets and Informative Feature Selection Techniques

K Adane, B Beyene, M Abebe - Journal of Artificial Intelligence …, 2024 - ojs.istp-press.com
One must interact with a specific webpage or website in order to use the Internet for
communication, teamwork, and other productive activities. However, because phishing …

Walkthrough phishing detection techniques

T Singh, M Kumar, S Kumar - Computers and Electrical Engineering, 2024 - Elsevier
Phishing has emerged as a significant cyber threat, resulting in huge financial frauds for
internet users annually. This malicious activity uses social engineering and upgraded …

A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link

R Zaimi, M Hafidi, M Lamia - The Journal of Supercomputing, 2024 - Springer
In contemporary times, the proliferation of phishing attacks presents a substantial and
growing challenge to cybersecurity. This fraudulent tactic is designed to deceive …

Detecting Phishing URLs through Deep Learning Models

S Noor, SU Bazai, S Tareen, S Ullah - Deep Learning for …, 2024 - taylorfrancis.com
Security is a challenging task in terms of communication and the Internet. There are various
ways to misuse and steal users' information through the Internet, but phishing is the utmost …

A Permutaion Importance Based feature selection method and Deep Learning Model to Detect Phishing Websites

R Zaimi, M Hafidi, L Mahnane - 2024 - researchsquare.com
Phishing attacks pose a significant and escalating threat to cybersecurity in recent times.
This deceptive scam aims to trick naive users, luring them into visiting harmful websites and …