A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

A survey of intelligent detection designs of HTML URL phishing attacks

S Asiri, Y Xiao, S Alzahrani, S Li, T Li - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social
engineering attacks where an attacker deceives users by sending fake messages using …

A comprehensive dual-layer architecture for phishing and spam email detection

J Doshi, K Parmar, R Sanghavi, N Shekokar - Computers & Security, 2023 - Elsevier
The widespread use of email communication for sharing personal, professional, and
financial data has rendered it vulnerable to cyber-attacks. Detecting untrustworthy emails …

The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19

AF Al‐Qahtani, S Cresci - IET Information Security, 2022 - Wiley Online Library
The COVID‐19 pandemic coincided with an equally‐threatening scamdemic: a global
epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during …

Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception

T Sutter, AS Bozkir, B Gehring, P Berlich - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …

Optimized and efficient image-based IoT malware detection method

A El-Ghamry, T Gaber, KK Mohammed, AE Hassanien - Electronics, 2023 - mdpi.com
With the widespread use of IoT applications, malware has become a difficult and
sophisticated threat. Without robust security measures, a massive volume of confidential and …

An improved long short term memory network for intrusion detection

AA Awad, AF Ali, T Gaber - Plos one, 2023 - journals.plos.org
Over the years, intrusion detection system has played a crucial role in network security by
discovering attacks from network traffics and generating an alarm signal to be sent to the …

Phish responder: A hybrid machine learning approach to detect phishing and spam emails

M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …

Determining psycholinguistic features of deception in phishing messages

T Xu, P Rajivan - Information & Computer Security, 2023 - emerald.com
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task
for most individuals. This study aims to investigate the psycholinguistic factors associated …