[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

A survey of intelligent detection designs of HTML URL phishing attacks

S Asiri, Y Xiao, S Alzahrani, S Li, T Li - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social
engineering attacks where an attacker deceives users by sending fake messages using …

Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings

AS Bozkir, FC Dalgic, M Aydos - Computers & Security, 2023 - Elsevier
There has been ever-growing use of Internet and progress within many communication
channels such as social media and this escalates the need for rapid and low source …

Phish responder: A hybrid machine learning approach to detect phishing and spam emails

M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …

Tsgn: Transaction subgraph networks for identifying ethereum phishing accounts

J Wang, P Chen, S Yu, Q Xuan - … 2021, Guangzhou, China, August 5–6 …, 2021 - Springer
Blockchain technology and, in particular, blockchain-based transaction offers us information
that has never been seen before in the financial world. In contrast to fiat currencies …

A new English/Arabic parallel corpus for phishing emails

S Salloum, T Gaber, S Vadera, K Shaalan - ACM Transactions on Asian …, 2023 - dl.acm.org
Phishing involves malicious activity whereby phishers, in the disguise of legitimate entities,
obtain illegitimate access to the victims' personal and private information, usually through …

Text Classification: A Review, Empirical, and Experimental Evaluation

K Taha, PD Yoo, C Yeun, A Taha - arXiv preprint arXiv:2401.12982, 2024 - arxiv.org
The explosive and widespread growth of data necessitates the use of text classification to
extract crucial information from vast amounts of data. Consequently, there has been a surge …