A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

Business email compromise phishing detection based on machine learning: a systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

Phishing website detection with semantic features based on machine learning classifiers: a comparative study

A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear
phishing. Phishing websites continue to be a problem. One of the main contributions to our …

A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment

BB Gupta, K Yadav, I Razzak, K Psannis… - Computer …, 2021 - Elsevier
In recent times, we can see a massive increase in the number of devices that are being
connected to the internet. These devices include but are not limited to smartphones, IoT, and …

Machine learning based phishing detection from URLs

OK Sahingoz, E Buber, O Demir, B Diri - Expert Systems with Applications, 2019 - Elsevier
Due to the rapid growth of the Internet, users change their preference from traditional
shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try …

Applying machine learning and natural language processing to detect phishing email

A Alhogail, A Alsabih - Computers & Security, 2021 - Elsevier
The growth of online services has been accompanied by increased growth in cyber-attacks.
One of the most common effective attacks is phishing, in which attempts are made to steal …

Cloud-based email phishing attack using machine and deep learning algorithm

UA Butt, R Amin, H Aldabbas, S Mohan… - Complex & Intelligent …, 2023 - Springer
Cloud computing refers to the on-demand availability of personal computer system assets,
specifically data storage and processing power, without the client's input. Emails are …

Phishing detection system through hybrid machine learning based on URL

A Karim, M Shahroz, K Mustofa, SB Belhaouari… - IEEE …, 2023 - ieeexplore.ieee.org
Currently, numerous types of cybercrime are organized through the internet. Hence, this
study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has …

Cybersecurity awareness enhancement: a study of the effects of age and gender of Thai employees associated with phishing attacks

T Daengsi, P Pornpongtechavanich… - Education and …, 2022 - Springer
Cybersecurity is crucial at present because cyber threats (eg, phishing) have become a very
common occurrence in everyday life. A literature review showed that there are no studies …

Efficient spam and phishing emails filtering based on deep learning

S Magdy, Y Abouelseoud, M Mikhail - Computer Networks, 2022 - Elsevier
Nowadays, spam emails represent a severe threat to security and cause a big waste in
transmission time and users' time spent in browsing unsolicited bulk emails (UBE). This is in …