SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Phishing website detection with semantic features based on machine learning classifiers: a comparative study

A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear
phishing. Phishing websites continue to be a problem. One of the main contributions to our …

Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism

Y Fang, C Zhang, C Huang, L Liu, Y Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …

Review on knowledge extraction from text and scope in agriculture domain

EA Nismi Mol, MB Santosh Kumar - Artificial Intelligence Review, 2023 - Springer
Abstract Knowledge extraction is meant by acquiring relevant information from the
unstructured document in natural language and representing them in a structured form …

[HTML][HTML] Multi-scale semantic deep fusion models for phishing website detection

DJ Liu, GG Geng, XC Zhang - Expert Systems with Applications, 2022 - Elsevier
In view of semantic counterfeiting characteristics of phishing websites and their multi-scale
composition, this paper fully considers the semantic information of different scales, and …

Learning from the ones that got away: Detecting new forms of phishing attacks

CN Gutierrez, T Kim, R Della Corte… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Phishing attacks continue to pose a major threat for computer system defenders, often
forming the first step in a multi-stage attack. There have been great strides made in phishing …

On the character of phishing URLs: Accurate and robust statistical learning classifiers

R Verma, K Dyer - Proceedings of the 5th ACM Conference on Data and …, 2015 - dl.acm.org
Phishing attacks resulted in an estimated $3.2 billion dollars worth of stolen property in
2007, and the success rate for phishing attacks is increasing each year [17]. Phishing …

Phishing email detection using persuasion cues

R Valecha, P Mandaokar… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Phishing is an attempt to acquire sensitive information from an unsuspecting victim by
malicious means. Recent studies have shown that phishers often use persuasion …

D-fence: A flexible, efficient, and comprehensive phishing email detection system

J Lee, F Tang, P Ye, F Abbasi, P Hay… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Phishing continues to be a major security concern for organizations around the globe. Past
works proposed classifiers to detect phishing emails; however many of them are based on …

Data quality for security challenges: Case studies of phishing, malware and intrusion detection datasets

RM Verma, V Zeng, H Faridi - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Techniques from data science are increasingly being applied by researchers to security
challenges. However, challenges unique to the security domain necessitate painstaking …