[HTML][HTML] A systematic literature review on phishing website detection techniques

A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain
sensitive information from an internet user. In this Systematic Literature Survey (SLR) …

A Systematic Literature Review on the NIS2 Directive

J Ruohonen - arXiv preprint arXiv:2412.08084, 2024 - arxiv.org
A directive known as NIS2 was enacted in the European Union (EU) in late 2022. It deals
particularly with European critical infrastructures, enlarging their scope substantially from an …

Compromised or {Attacker-Owned}: A large scale classification and study of hosting domains of malicious {URLs}

R De Silva, M Nabeel, C Elvitigala, I Khalil… - 30th USENIX security …, 2021 - usenix.org
The mitigation action against a malicious website may differ greatly depending on how that
site is hosted. If it is hosted under a private apex domain, where all its subdomains and …

Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt

N Begou, J Vinoy, A Duda… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
This paper explores the possibility of using Chat-GPT to develop advanced phishing attacks
and automate their large-scale deployment. We make ChatGPT generate the following parts …

Panning for gold. eth: Understanding and Analyzing ENS Domain Dropcatching

M Muzammil, Z Wu, A Balasubramanian… - Proceedings of the …, 2024 - dl.acm.org
Ethereum Name Service (ENS) domains allow users to map human-readable names (such
as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …

Are you human? resilience of phishing detection to evasion techniques based on human verification

S Maroofi, M Korczyński, A Duda - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Phishing is one of the most common cyberattacks these days. Attackers constantly look for
new techniques to make their campaigns more lucrative by extending the lifespan of …

[HTML][HTML] Web of shadows: Investigating malware abuse of internet services

M Allegretta, G Siracusano, R González… - Computers & …, 2025 - Elsevier
Internet Web and cloud services are routinely abused by malware, but the breadth of this
abuse has not been thoroughly investigated. In this work, we quantitatively investigate this …

[HTML][HTML] Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics

C Opara, Y Chen, B Wei - Expert Systems with Applications, 2024 - Elsevier
Phishing websites distribute unsolicited content and are frequently used to commit email
and internet fraud. Detecting them before any user information is submitted is critical …

Characterizing and Mitigating Phishing Attacks at ccTLD Scale

GCM Moura, T Daniels, M Bosteels, S Castro… - Proceedings of the …, 2024 - dl.acm.org
Phishing on the web is a model of social engineering and an attack vector for getting access
to sensitive and financial data of individuals and corporations. Phishing has been identified …

Study on domain name system (dns) abuse: Technical report

J Bayer, Y Nosyk, O Hureau, S Fernandez… - arXiv preprint arXiv …, 2022 - arxiv.org
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …