Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Classifying phishing URLs using recurrent neural networks

AC Bahnsen, EC Bohorquez, S Villegas… - … on electronic crime …, 2017 - ieeexplore.ieee.org
As the technical skills and costs associated with the deployment of phishing attacks
decrease, we are witnessing an unprecedented level of scams that push the need for better …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages

Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan… - 30th USENIX Security …, 2021 - usenix.org
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …

[PDF][PDF] Machine learning: A review on binary classification

R Kumari, SK Srivastava - International Journal of Computer …, 2017 - researchgate.net
In the field of information extraction and retrieval, binary classification is the process of
classifying given document/account on the basis of predefined classes. Sockpuppet …

Systematization of knowledge (sok): A systematic review of software-based web phishing detection

Z Dou, I Khalil, A Khreishah… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Phishing is a form of cyber attack that leverages social engineering approaches and other
sophisticated techniques to harvest personal information from users of websites. The …

[PDF][PDF] Feature extraction or feature selection for text classification: A case study on phishing email detection

M Zareapoor, KR Seeja - International Journal of Information …, 2015 - mecs-press.org
Dimensionality reduction is generally performed when high dimensional data like text are
classified. This can be done either by using feature extraction techniques or by using feature …

[PDF][PDF] Deepphish: simulating malicious ai

AC Bahnsen, I Torroledo, LD Camacho… - … APWG symposium on …, 2018 - i.blackhat.com
DeepPhish Simulating Malicious AI Page 1 DeepPhish Simulating Malicious AI Alejandro
Correa Bahnsen, PhD VP, AI & Research –Cyxtera Technologies Page 2 About Me • Industrial …