The Role of AI in Cyber Security: Safeguarding Digital Identity

M Binhammad, S Alqaydi, A Othman… - Journal of …, 2024 - journal.251news.co.in
This article signals the use of Artificial Intelligence (AI) in information security where its
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …

An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach

S Jamal, H Wimmer, IH Sarker - Security and Privacy, 2024 - Wiley Online Library
Phishing and spam have been a cybersecurity threat with the majority of breaches resulting
from these types of social engineering attacks. Therefore, detection has been a long …

Machine Learning Based Phishing Attacks Detection Using Multiple Datasets.

AH Aljammal, A Qawasmeh… - International Journal of …, 2023 - search.ebscohost.com
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so
an accurate phishing detection system is required. Therefore, many phishing detection …

A systematic literature review on phishing and anti-phishing techniques

A Arshad, AU Rehman, S Javaid, TM Ali… - arXiv preprint arXiv …, 2021 - arxiv.org
Phishing is the number one threat in the world of internet. Phishing attacks are from decades
and with each passing year it is becoming a major problem for internet users as attackers …

Uncovering the role of optimism bias in social media phishing: An empirical study on TikTok

W Lei, S Hu, C Hsu - Behaviour & Information Technology, 2023 - Taylor & Francis
Driven by the rapid growth and prevalent use of social media, social media phishing has
become an increasingly serious threat due to its wide-ranging disruptive potential …

Privacy of web browsers: a challenge in digital forensics

A Ahmed, AR Javed, Z Jalil, G Srivastava… - … : Proceedings of the …, 2022 - Springer
Web browsers are ubiquitous applications to access public and private applications over the
Internet, Intranet, and Extranet. The increased demand for cybersecurity, including data …

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …

A deep learning assisted personalized deception system for countering web application attacks

WB Shahid, B Aslam, H Abbas, H Afzal… - Journal of Information …, 2022 - Elsevier
Recent years have seen momentous growth in web attacks that has motivated researchers
to come up with sophisticated techniques to tackle them. Lately, there has been growing …

[PDF][PDF] Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study …

K Okokpujie, CG Kennedy, K Nnodu… - International Journal …, 2023 - researchgate.net
Accepted: 1 November 2022 With the advancement in information communication
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …

Can ai keep you safe? a study of large language models for phishing detection

R Chataut, PK Gyawali, Y Usman - 2024 IEEE 14th Annual …, 2024 - ieeexplore.ieee.org
Phishing attacks continue to be a pervasive challenge in cybersecurity, with threat actors
constantly developing new strategies to penetrate email inboxes and compromise sensitive …