A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

Smart home security: challenges, issues and solutions at different IoT layers

H Touqeer, S Zaman, R Amin, M Hussain… - The Journal of …, 2021 - Springer
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the
security model employed to protect user data and prevent devices from engaging in …

An effective detection approach for phishing websites using URL and HTML features

A Aljofey, Q Jiang, A Rasool, H Chen, W Liu, Q Qu… - Scientific Reports, 2022 - nature.com
Today's growing phishing websites pose significant threats due to their extremely
undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

An effective phishing detection model based on character level convolutional neural network from URL

A Aljofey, Q Jiang, Q Qu, M Huang, JP Niyigena - Electronics, 2020 - mdpi.com
Phishing is the easiest way to use cybercrime with the aim of enticing people to give
accurate information such as account IDs, bank details, and passwords. This type of …

Accurate and fast URL phishing detector: a convolutional neural network approach

W Wei, Q Ke, J Nowak, M Korytkowski, R Scherer… - Computer Networks, 2020 - Elsevier
Along with the development of the Internet, methods of fraud and ways to obtain important
data such as logins and passwords or personal sensitive data have evolved. One way of …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

A stacking model using URL and HTML features for phishing webpage detection

Y Li, Z Yang, X Chen, H Yuan, W Liu - Future Generation Computer …, 2019 - Elsevier
In this paper, we present a stacking model to detect phishing webpages using URL and
HTML features. In terms of features, we design lightweight URL and HTML features and …