[HTML][HTML] A systematic literature review on phishing website detection techniques

A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain
sensitive information from an internet user. In this Systematic Literature Survey (SLR) …

Phishing or not phishing? A survey on the detection of phishing websites

R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …

Cognitive elements of learning and discriminability in anti-phishing training

K Singh, P Aggarwal, P Rajivan, C Gonzalez - Computers & Security, 2023 - Elsevier
People adjust decisions based on their experiences; and it is important to know how to
shape these experiences effectively to improve their future decisions. We conducted …

A comprehensive survey of automated website phishing detection techniques: a perspective of artificial intelligence and human behaviors

C Rajeswary, M Thirumaran - 2023 International conference on …, 2023 - ieeexplore.ieee.org
Phishing is a web-based attack that applies social engineering techniques to take
advantage of Internet users and obtain sensitive information. Mostly, the phishing attack …

Machine Learning Based Phishing Attacks Detection Using Multiple Datasets.

AH Aljammal, A Qawasmeh… - International Journal of …, 2023 - search.ebscohost.com
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so
an accurate phishing detection system is required. Therefore, many phishing detection …

[PDF][PDF] Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study …

K Okokpujie, CG Kennedy, K Nnodu… - International Journal …, 2023 - researchgate.net
Accepted: 1 November 2022 With the advancement in information communication
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …

Binary Hunter–Prey Optimization with Machine Learning—Based Cybersecurity Solution on Internet of Things Environment

AO Khadidos, ZM AlKubaisy, AO Khadidos, KH Alyoubi… - Sensors, 2023 - mdpi.com
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit
and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in …

Phishing URL detection by leveraging RoBERTa for feature extraction and LSTM for classification

KS Jishnu, B Arthi - 2023 Second International Conference on …, 2023 - ieeexplore.ieee.org
A serious cybersecurity threat is phishing attacks, which use bogus URLs to fool users into
disclosing critical information. These attacks affect human vulnerability and potentially result …

Intellitweet: A multifaceted feature approach to detect malicious tweets

EE Dzeha, GV Jourdan - … Symposium on Foundations and Practice of …, 2023 - Springer
Twitter faces an ongoing issue with malicious tweets from deceptive accounts engaged in
phishing, scams, and spam, negatively impacting the overall Twitter user experience. In …

DeFi Security: Turning The Weakest Link Into The Strongest Attraction

R Kashyap - arXiv preprint arXiv:2312.00033, 2023 - arxiv.org
The primary innovation we pioneer--focused on blockchain information security--is called
the Safe-House. The Safe-House is badly needed since there are many ongoing hacks and …