A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

Detecting phishing attacks using natural language processing and machine learning

T Peng, I Harris, Y Sawa - 2018 ieee 12th international …, 2018 - ieeexplore.ieee.org
Phishing attacks are one of the most common and least defended security threats today. We
present an approach which uses natural language processing techniques to analyze text …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors

H Chen, CE Beaudoin, T Hong - Computers in human behavior, 2017 - Elsevier
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …

Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism

Y Fang, C Zhang, C Huang, L Liu, Y Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …

Jail-Phish: An improved search engine based phishing detection system

RS Rao, AR Pais - Computers & Security, 2019 - Elsevier
Stealing of sensitive information (username, password, credit card information and social
security number, etc.) using a fake webpage that imitates trusted website is termed as …

Learning from the ones that got away: Detecting new forms of phishing attacks

CN Gutierrez, T Kim, R Della Corte… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Phishing attacks continue to pose a major threat for computer system defenders, often
forming the first step in a multi-stage attack. There have been great strides made in phishing …

What's in a url: Fast feature extraction and malicious url detection

R Verma, A Das - Proceedings of the 3rd ACM on International …, 2017 - dl.acm.org
Phishing is an online social engineering attack with the goal of digital identity theft carried
out by pretending to be a legitimate entity. The attacker sends an attack vector commonly in …