[HTML][HTML] A systematic literature review on phishing website detection techniques

A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain
sensitive information from an internet user. In this Systematic Literature Survey (SLR) …

[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …

[HTML][HTML] On the use of deep learning in software defect prediction

G Giray, KE Bennin, Ö Köksal, Ö Babur… - Journal of Systems and …, 2023 - Elsevier
Context: Automated software defect prediction (SDP) methods are increasingly applied,
often with the use of machine learning (ML) techniques. Yet, the existing ML-based …

Business email compromise phishing detection based on machine learning: a systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Prompt engineering or fine-tuning? a case study on phishing detection with large language models

F Trad, A Chehab - Machine Learning and Knowledge Extraction, 2024 - mdpi.com
Large Language Models (LLMs) are reshaping the landscape of Machine Learning (ML)
application development. The emergence of versatile LLMs capable of undertaking a wide …

Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study

K Joshi, C Bhatt, K Shah, D Parmar, JM Corchado… - Algorithms, 2023 - mdpi.com
Security in the blockchain has become a topic of concern because of the recent
developments in the field. One of the most common cyberattacks is the so-called phishing …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Badlabel: A robust perspective on evaluating and enhancing label-noise learning

J Zhang, B Song, H Wang, B Han, T Liu… - IEEE transactions on …, 2024 - ieeexplore.ieee.org
Label-noise learning (LNL) aims to increase the model's generalization given training data
with noisy labels. To facilitate practical LNL algorithms, researchers have proposed different …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …