Smart home security: challenges, issues and solutions at different IoT layers

H Touqeer, S Zaman, R Amin, M Hussain… - The Journal of …, 2021 - Springer
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …

Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Intelligent cyber-phishing detection for online

PA Barraclough, G Fehringer, J Woodward - computers & security, 2021 - Elsevier
Phishing attacks are on the increase, resulting in financial loss and theft of sensitive
information to online services and users. Anti-phishing approaches have concentrated on …

A heuristic technique to detect phishing websites using TWSVM classifier

RS Rao, AR Pais, P Anand - Neural Computing and Applications, 2021 - Springer
Phishing websites are on the rise and are hosted on compromised domains such that
legitimate behavior is embedded into the designed phishing site to overcome the detection …

Combining text and visual features to improve the identification of cloned webpages for early phishing detection

B Van Dooremaal, P Burda, L Allodi… - Proceedings of the 16th …, 2021 - dl.acm.org
Phishing attacks arrive in high numbers and often spread quickly, meaning that after-the-fact
countermeasures such as domain blacklisting are limited in efficacy. Visual similarity-based …

Phishing attacks detection a machine learning-based approach

F Salahdine, Z El Mrabet… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Phishing attacks are one of the most common social engineering attacks targeting users'
emails to fraudulently steal confidential and sensitive information. They can be used as a …

A comparison of features in a crowdsourced phishing warning system

C Nguyen, ML Jensen, A Durcikova… - Information Systems …, 2021 - Wiley Online Library
Initial research on using crowdsourcing as a collaborative method for helping individuals
identify phishing messages has shown promising results. However, the vast majority of …

Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection

K Nirmal, B Janet, R Kumar - Peer-to-Peer Networking and Applications, 2021 - Springer
In today's cyber era, Internet of Things (IoT) based products are increasingly adopted by
users for various purposes. Accesses to these systems are facilitated via a web application …

HinPhish: An effective phishing detection approach based on heterogeneous information networks

B Guo, Y Zhang, C Xu, F Shi, Y Li, M Zhang - Applied Sciences, 2021 - mdpi.com
Internet users have suffered from phishing attacks for a long time. Attackers deceive users
through malicious constructed phishing websites to steal sensitive information, such as bank …