A comprehensive survey of AI-enabled phishing attacks detection techniques

A Basit, M Zafar, X Liu, AR Javed, Z Jalil… - Telecommunication …, 2021 - Springer
In recent times, a phishing attack has become one of the most prominent attacks faced by
internet users, governments, and service-providing organizations. In a phishing attack, the …

Phishing classification techniques: A systematic literature review

R Abdillah, Z Shukur, M Mohd, TMZ Murah - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing has become a serious and concerning problem within the past 10 years, with many
reviews describing attack patterns and anticipating different method utilizations. This …

Detecting phishing domains using machine learning

S Alnemari, M Alshammari - Applied Sciences, 2023 - mdpi.com
Phishing is an online threat where an attacker impersonates an authentic and trustworthy
organization to obtain sensitive information from a victim. One example of such is trolling …

Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection

A Chohra, P Shirani, EMB Karbab, M Debbabi - Computers & Security, 2022 - Elsevier
In this paper, we propose an optimization approach by leveraging swarm intelligence and
ensemble methods to solve the non-deterministic feature selection problem. The proposed …

Short‐Term Load Forecasting Using Neural Network and Particle Swarm Optimization (PSO) Algorithm

Z Shafiei Chafi, H Afrakhte - Mathematical Problems in …, 2021 - Wiley Online Library
Electrical load forecasting plays a key role in power system planning and operation
procedures. So far, a variety of techniques have been employed for electrical load …

Hybrid filter and genetic algorithm-based feature selection for improving cancer classification in high-dimensional microarray data

W Ali, F Saeed - Processes, 2023 - mdpi.com
The advancements in intelligent systems have contributed tremendously to the fields of
bioinformatics, health, and medicine. Intelligent classification and prediction techniques …

An optimized stacking ensemble model for phishing websites detection

M Al-Sarem, F Saeed, ZG Al-Mekhlafi, BA Mohammed… - Electronics, 2021 - mdpi.com
Security attacks on legitimate websites to steal users' information, known as phishing
attacks, have been increasing. This kind of attack does not just affect individuals' or …

An optimized case-based software project effort estimation using genetic algorithm

S Hameed, Y Elsheikh, M Azzeh - Information and Software Technology, 2023 - Elsevier
Software development companies have long suffered from inaccurate estimation of their
software projects. This in turn led to huge losses, especially in the financial resources …

A novel phishing detection system using binary modified equilibrium optimizer for feature selection

S Minocha, B Singh - Computers & Electrical Engineering, 2022 - Elsevier
The Digital era faces security concerns due to the explosive growth of cyber-attacks, such as
phishing attacks, man-in-the-middle attacks, and many more. Phishing attackers deceive …

Phishing websites detection by using optimized stacking ensemble model

Z Ghaleb Al-Mekhlafi… - … Systems Science and …, 2022 - irep.ntu.ac.uk
Phishing attacks are security attacks that do not affect only individuals' or organizations'
websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an …