A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

[HTML][HTML] Artificial Intelligence Technologies Revolutionizing Wastewater Treatment: Current Trends and Future Prospective

AE Alprol, AT Mansour, MEED Ibrahim, M Ashour - Water, 2024 - mdpi.com
Integration of the Internet of Things (IoT) into the fields of wastewater treatment and water
quality prediction has the potential to revolutionize traditional approaches and address …

HTTP header based phishing attack detection using machine learning

S Shukla, M Misra, G Varshney - Transactions on Emerging …, 2024 - Wiley Online Library
In the past, many techniques like blacklisting/whitelisting, third‐party, search engine, visual
similarity, heuristic, URL features, and website content were used for anti‐phishing. Search …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

Single and hybrid-ensemble learning-based phishing website detection: examining impacts of varied nature datasets and informative feature selection technique

K Adane, B Beyene, M Abebe - Digital Threats: Research and Practice, 2023 - dl.acm.org
To tackle issues associated with phishing website attacks, the study conducted rigorous
experiments on RF, GB, and CATB classifiers. Since each classifier was an ensemble …

Deep reinforcement learning-based malicious url detection with feature selection

A Maci, N Tamma, A Coscia - 2024 IEEE 3rd International …, 2024 - ieeexplore.ieee.org
Data theft through web applications that emulate legitimate platforms constitutes a major
network security issue. Countermeasures using artificial intelligence (AI)-based systems are …

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …

URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network

M Nanda, S Goel - Multimedia Tools and Applications, 2024 - Springer
Phishing is an attack that attempts to replicate the official websites of businesses, including
government agencies, financial institutions, e-commerce platforms, and banks. These …

An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey

T Ige, C Kiekintveld, A Piplai - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In this research, we analyzed the suitability of each of the current state-of-the-art machine
learning models for various cyberattack detection from the past 5 years with a major …

Multiscale Feature Fusion and Graph Convolutional Network for Detecting Ethereum Phishing Scams

Z Chen, J Huang, S Liu, H Long - Electronics, 2024 - mdpi.com
With the emergence of blockchain technology, the cryptocurrency market has experienced
significant growth in recent years, simultaneously fostering environments conducive to …