SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

[HTML][HTML] Early-stage malware prediction using recurrent neural networks

M Rhode, P Burnap, K Jones - computers & security, 2018 - Elsevier
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted
quickly by examining the features of an executable piece of code and matching it to …

Can we predict a riot? Disruptive event detection using Twitter

N Alsaedi, P Burnap, O Rana - ACM Transactions on Internet …, 2017 - dl.acm.org
In recent years, there has been increased interest in real-world event detection using
publicly accessible data made available through Internet technology such as Twitter …

Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models

S Afzal, M Asim, AR Javed, MO Beg, T Baker - Journal of Network and …, 2021 - Springer
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

[HTML][HTML] Disrupting drive-by download networks on Twitter

A Javed, R Ikwu, P Burnap, L Giommoni… - Social Network Analysis …, 2022 - Springer
This paper tests disruption strategies in Twitter networks containing malicious URLs used in
drive-by download attacks. Cybercriminals use popular events that attract a large number of …

Efficient detection of phishing websites using multilayer perceptron

A Odeh, I Keshta, E Abdelfattah - 2020 - learntechlib.org
Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming
websites. In this paper, a novel approach is utilized that uses a Neural Network with a …

Using supervised machine learning algorithms to detect suspicious URLs in online social networks

M Al-Janabi, E Quincey, P Andras - Proceedings of the 2017 IEEE/ACM …, 2017 - dl.acm.org
The increasing volume of malicious content in social networks requires automated methods
to detect and eliminate such content. This paper describes a supervised machine learning …

A real-time deep-learning approach for filtering Arabic low-quality content and accounts on Twitter

R Alharthi, A Alhothali, K Moria - Information Systems, 2021 - Elsevier
Social networks have generated immense amounts of data that have been successfully
utilized for research and business purposes. The approachability and immediacy of social …

[HTML][HTML] Prediction of drive-by download attacks on twitter

A Javed, P Burnap, O Rana - Information Processing & Management, 2019 - Elsevier
The popularity of Twitter for information discovery, coupled with the automatic shortening of
URLs to save space, given the 140 character limit, provides cybercriminals with an …

Supervised machine learning for detecting malicious URLs: an evaluation of different models

J Telo - Sage Science Review of Applied Machine …, 2022 - journals.sagescience.org
Malicious URLs are often used to distribute malware, steal personal information, or engage
in phishing attacks. Traditional approaches for identifying these URLs are often ineffective …