Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

Phishing email detection model using deep learning

S Atawneh, H Aljehani - Electronics, 2023 - mdpi.com
Email phishing is a widespread cyber threat that can result in the theft of sensitive
information and financial loss. It uses malicious emails to trick recipients into providing …

Enhancing phishing detection: A novel hybrid deep learning framework for cybercrime forensics

FS Alsubaei, AA Almazroi, N Ayub - IEEE Access, 2024 - ieeexplore.ieee.org
Protecting against interference is essential at a time when wireless communications are
essential for sending large amounts of data. Our research presents a novel deep learning …

URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network

M Nanda, S Goel - Multimedia Tools and Applications, 2024 - Springer
Phishing is an attack that attempts to replicate the official websites of businesses, including
government agencies, financial institutions, e-commerce platforms, and banks. These …

An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey

T Ige, C Kiekintveld, A Piplai - arXiv preprint arXiv:2402.17045, 2024 - arxiv.org
To secure computers and information systems from attackers taking advantage of
vulnerabilities in the system to commit cybercrime, several methods have been proposed for …

Towards Automating the Identification of Sustainable Projects Seeking Financial Support: An AI-Powered Approach

H Behrooz, C Lipizzi, G Korfiatis, M Ilbeigi, M Powell… - Sustainability, 2023 - mdpi.com
The criticality of sustainable development to control the unprecedented consequences of
climate change is clear. A vital element in launching sustainability projects is financing …

Intrusion Detection with deep learning: A literature review

BK Sedraoui, A Benmachiche… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
As technology continues to grow and becomes increasingly integral to education, institutions
and universities worldwide are making substantial investments in e-learning platforms to …

Hybrid optimization enabled squeeze net for phishing attack detection

N Kamble, N Mishra - Computers & Security, 2024 - Elsevier
Nowadays, phishing attacks are considered as one of the most common cyber-attacks which
generally harm the security of various internet and communication systems. The phishing …

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

MA Tamal, MK Islam, T Bhuiyan, A Sattar… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …

A hybrid deep learning technique for spoofing website URL detection in real-time applications

BC Ujah-Ogbuagu, ON Akande, E Ogbuju - Journal of Electrical Systems …, 2024 - Springer
Abstract Website Uniform Resource Locator (URL) spoofing remains one of the ways of
perpetrating phishing attacks in the twenty-first century. Hackers continue to employ URL …