A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

[HTML][HTML] Online social networks security and privacy: comprehensive review and analysis

AK Jain, SR Sahoo, J Kaubiyal - Complex & Intelligent Systems, 2021 - Springer
With fast-growing technology, online social networks (OSNs) have exploded in popularity
over the past few years. The pivotal reason behind this phenomenon happens to be the …

[HTML][HTML] Phishing website detection with semantic features based on machine learning classifiers: a comparative study

A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear
phishing. Phishing websites continue to be a problem. One of the main contributions to our …

[HTML][HTML] A survey of machine learning-based solutions for phishing website detection

L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can
be said that a secure network environment is a basis for the rapid and sound development of …

XAI for cybersecurity: state of the art, challenges, open issues and future directions

G Srivastava, RH Jhaveri, S Bhattacharya… - arXiv preprint arXiv …, 2022 - arxiv.org
In the past few years, artificial intelligence (AI) techniques have been implemented in almost
all verticals of human life. However, the results generated from the AI models often lag …

Evaluating organizational phishing awareness training on an enterprise scale

D Hillman, Y Harel, E Toch - Computers & Security, 2023 - Elsevier
Employees are often the victims of phishing attacks, posing a threat to both themselves and
their organizations. In response, organizations are dedicating resources, time, and …

Improving malicious email detection through novel designated deep-learning architectures utilizing entire email

T Muralidharan, N Nissim - Neural Networks, 2023 - Elsevier
In today's email dependent world, cyber criminals often target organizations using a variety
of social engineering techniques and specially crafted malicious emails. When successful …

[HTML][HTML] Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection

N Bacanin, M Zivkovic, M Antonijevic… - Complex & Intelligent …, 2023 - Springer
Feature selection and hyper-parameters optimization (tuning) are two of the most important
and challenging tasks in machine learning. To achieve satisfying performance, every …

[HTML][HTML] Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems

Y Zhan, SF Ahmad, M Irshad, M Al-Razgan, EM Awwad… - Heliyon, 2024 - cell.com
Abstract Information technology is one of the most rapidly growing technologies globally.
Over the last decade, its usage in healthcare has been remarkable. Over the last decade, its …

A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks

B Biswas, A Mukhopadhyay, A Kumar… - Decision Support Systems, 2024 - Elsevier
Phishing and social engineering contribute to various cyber incidents such as data breaches
and ransomware attacks, financial frauds, and denial of service attacks. Often, phishers …