Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix

Y Shin, K Kim, JJ Lee, K Lee - Security and Communication …, 2022 - Wiley Online Library
In the past, phishing techniques were a common means of attack carried out by individuals
or small groups via spam mail on a randomly selected target. However, in recent years …

Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models

N Altwaijry, I Al-Turaiki, R Alotaibi, F Alakeel - Sensors, 2024 - mdpi.com
Phishing is one of the most dangerous attacks targeting individuals, organizations, and
nations. Although many traditional methods for email phishing detection exist, there is a …

HTTP header based phishing attack detection using machine learning

S Shukla, M Misra, G Varshney - Transactions on Emerging …, 2024 - Wiley Online Library
In the past, many techniques like blacklisting/whitelisting, third‐party, search engine, visual
similarity, heuristic, URL features, and website content were used for anti‐phishing. Search …

[HTML][HTML] COVID-19 malicious domain names classification

PK Mvula, P Branco, GV Jourdan, HL Viktor - Expert Systems with …, 2022 - Elsevier
Due to the rapid technological advances that have been made over the years, more people
are changing their way of living from traditional ways of doing business to those featuring …

Social engineering attacks: Recent advances and challenges

N Mashtalyar, UN Ntaganzwa, T Santos… - … Conference on Human …, 2021 - Springer
The world's technological landscape is continuously evolving with new possibilities, yet also
evolving in parallel with the emergence of new threats. Social engineering is of predominant …

Email classification and forensics analysis using machine learning

M Hina, M Ali, AR Javed, G Srivastava… - … Advanced & Trusted …, 2021 - ieeexplore.ieee.org
Emails are being used as a reliable, secure, and formal mode of communication for a long
time. With fast and secure communication technologies, reliance on Email has increased as …

Comparing and analyzing applications of intelligent techniques in cyberattack detection

P Dixit, R Kohli, A Acevedo-Duque… - Security and …, 2021 - Wiley Online Library
Now a day's advancement in technology increases the use of automation, mobility, smart
devices, and application over the Internet that can create serious problems for protection …

Trustworthy intrusion detection in e-healthcare systems

F Akram, D Liu, P Zhao, N Kryvinska, S Abbas… - Frontiers in public …, 2021 - frontiersin.org
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS)
play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a …

[PDF][PDF] Evading obscure communication from spam emails

KF Rafat, Q Xin, AR Javed, Z Jalil, RZ Ahmad - Math. Biosci. Eng, 2022 - aimspress.com
Spam is any form of annoying and unsought digital communication sent in bulk and may
contain offensive content feasting viruses and cyber-attacks. The voluminous increase in …

Social Networking Security during COVID‐19: A Systematic Literature Review

R Abid, M Rizwan, P Veselý, A Basharat… - Wireless …, 2022 - Wiley Online Library
During the Covid‐19 Pandemic, the usage of social media networks increased
exponentially. People engage in education, business, shopping, and other social activities …