Applications of deep learning for phishing detection: a systematic literature review

C Catal, G Giray, B Tekinerdogan, S Kumar… - … and Information Systems, 2022 - Springer
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …

XAI for cybersecurity: state of the art, challenges, open issues and future directions

G Srivastava, RH Jhaveri, S Bhattacharya… - arXiv preprint arXiv …, 2022 - arxiv.org
In the past few years, artificial intelligence (AI) techniques have been implemented in almost
all verticals of human life. However, the results generated from the AI models often lag …

A hybrid DNN–LSTM model for detecting phishing URLs

A Ozcan, C Catal, E Donmez, B Senturk - Neural Computing and …, 2023 - Springer
Phishing is an attack targeting to imitate the official websites of corporations such as banks,
e-commerce, financial institutions, and governmental institutions. Phishing websites aim to …

Phishing attacks detection using machine learning approach

MN Alam, D Sarma, FF Lima, I Saha… - … conference on smart …, 2020 - ieeexplore.ieee.org
Evolving digital transformation has exacerbated cybersecurity threats globally. Digitization
expands the doors wider to cybercriminals. Initially cyberthreats approach in the form of …

Machine learningtechniquesfor detection of website phishing: A review for promises and challenges

A Odeh, I Keshta, E Abdelfattah - 2021 IEEE 11th Annual …, 2021 - ieeexplore.ieee.org
Websites phishing is a cyber-attack that targets online users to steal their sensitive
informationincluding login credentials and banking details. Attackers fool the users by …

Phishing classification techniques: A systematic literature review

R Abdillah, Z Shukur, M Mohd, TMZ Murah - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing has become a serious and concerning problem within the past 10 years, with many
reviews describing attack patterns and anticipating different method utilizations. This …

Security in social-media: Awareness of Phishing attacks techniques and countermeasures

A Alharbi, A Alotaibi, L Alghofaili… - … on Computing and …, 2022 - ieeexplore.ieee.org
As time progresses, the social media security is one of the basic aspects to consider when
browsing the internet. Nowadays all people using social media approximately, using social …

[PDF][PDF] Online Attacks Types of Data Breach and CyberAttack Prevention Methods

MA Baballe, A Hussaini, MI Bello… - Current Trends in …, 2022 - academia.edu
Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into
providing their private information. The need to look for and develop methods of detecting …

SGX-UAM: A secure unified access management scheme with one time passwords via Intel SGX

L Wu, HJ Cai, H Li - IEEE Access, 2021 - ieeexplore.ieee.org
With the convergence of fixed and mobile networks, heterogeneous networks are becoming
ubiquitous. Internet giants are seeing the plight of identity authentication. To address this …

[PDF][PDF] Management of vulnerabilities in cyber security

S Muhammad, AM Lawan… - Journal homepage: https …, 2023 - academia.edu
Cybercriminals frequently use phishing attempts to trick unwary individuals into disclosing
their personal information. The detection of the cybersecurity (CS) state of Internet of Things …