A comprehensive dual-layer architecture for phishing and spam email detection

J Doshi, K Parmar, R Sanghavi, N Shekokar - Computers & Security, 2023 - Elsevier
The widespread use of email communication for sharing personal, professional, and
financial data has rendered it vulnerable to cyber-attacks. Detecting untrustworthy emails …

Improving malicious email detection through novel designated deep-learning architectures utilizing entire email

T Muralidharan, N Nissim - Neural Networks, 2023 - Elsevier
In today's email dependent world, cyber criminals often target organizations using a variety
of social engineering techniques and specially crafted malicious emails. When successful …

Using Clustering Algorithms to Automatically Identify Phishing Campaigns

K Althobaiti, K Vaniea, MK Wolters, N Alsufyani - IEEE Access, 2023 - ieeexplore.ieee.org
Attackers attempt to create successful phishing campaigns by sending out trustworthy-
looking emails with a range of variations, such as adding the recipient name in the subject …

A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies

SK Birthriya, P Ahlawat, AK Jain - Journal of Applied Security …, 2024 - Taylor & Francis
Social engineering attacks pose a significant threat to individuals, organizations, and
governments globally. These attacks leverage human psychology, manipulating individuals …

[PDF][PDF] Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification.

R Brindha, S Nandagopal, H Azath… - … Materials & Continua, 2023 - cdn.techscience.cn
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized
persons or entities and hack the victims' sensitive data. E-mails, instant messages and …

[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …

A real-time machine learning application for browser extension security monitoring

TP Fowdur, S Hosenally - Information Security Journal: A Global …, 2024 - Taylor & Francis
One of the most common attacks in browser extensions is Cross-site scripting (XSS). To
address these challenges, several browsers have proposed a new mechanism where …

A Novel Approach to Detect Phishing Webpages Hosted on Compromised Domain

AK Jain - … on System, Computation, Automation and Networking …, 2023 - ieeexplore.ieee.org
Nowadays cybercriminals host malicious webpages on the legitimate domains to bypass
existing anti-phishing methods. Therefore, this paper presents a new hyperlink-based …

Phishing URL Detection using Deep Q-Networks with Convolutional Neural Networks

SK Birthriya, P Ahlawat, AK Jain - … International Conference on …, 2024 - ieeexplore.ieee.org
This research presents an innovative approach to phishing URL detection by integrating
hybrid features with Deep Q-Networks and convolutional neural networks. This combined …

Detecting URL Phishing Using BERT and DistilBERT Classifiers

J Kumar - International conference on soft computing for problem …, 2023 - Springer
In this paper, we investigate the use of transformer models, especially BERT and DistilBERT,
for phishing URL detection. Such malicious URLs are a crucial part of phishing attacks …