A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Phishing detection leveraging machine learning and deep learning: A review
DM Divakaran, A Oest - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
Phishing attacks trick victims into disclosing sensitive information. To counter them, we
explore machine learning and deep learning models leveraging large-scale data. We …
explore machine learning and deep learning models leveraging large-scale data. We …
Phishing or not phishing? A survey on the detection of phishing websites
R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …
brands. Although this threat has been around for quite a long time, it is still very active and …
Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach
Explainable phishing detection approaches are usually based on references, ie, they
compare a suspicious webpage against a reference list of commonly targeted legitimate …
compare a suspicious webpage against a reference list of commonly targeted legitimate …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
Generating phishing attacks using chatgpt
SS Roy, KV Naragam, S Nilizadeh - arXiv preprint arXiv:2305.05133, 2023 - arxiv.org
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …
it a popular tool for conversational agents, content creation, data analysis, and research and …
Phishing URL detection: A real-case scenario through login URLs
M Sánchez-Paniagua, EF Fernández, E Alegre… - IEEE …, 2022 - ieeexplore.ieee.org
Phishing is a social engineering cyberattack where criminals deceive users to obtain their
credentials through a login form that submits the data to a malicious server. In this paper, we …
credentials through a login form that submits the data to a malicious server. In this paper, we …
[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …
presents are endless. While the fundamental rules of DNS are straightforward, DNS …
[HTML][HTML] The applicability of a hybrid framework for automated phishing detection
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital
landscape. As cybercriminals continually adapt their techniques, automated phishing …
landscape. As cybercriminals continually adapt their techniques, automated phishing …
Spacephish: The evasion-space of adversarial attacks against phishing website detectors using machine learning
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …
that break every ML model, or defenses that withstand most attacks. Unfortunately, little …