Detecting phishing attacks using natural language processing and machine learning
Phishing attacks are one of the most common and least defended security threats today. We
present an approach which uses natural language processing techniques to analyze text …
present an approach which uses natural language processing techniques to analyze text …
[HTML][HTML] Panning for gold: Automatically analysing online social engineering attack surfaces
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …
[HTML][HTML] An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment
Phishing has become a favorite method of hackers for committing data theft and continues to
evolve. As long as phishing websites continue to operate, many more people and …
evolve. As long as phishing websites continue to operate, many more people and …
Phish responder: A hybrid machine learning approach to detect phishing and spam emails
M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …
Emailprofiler: Spearphishing filtering with header and stylometric features of emails
Spearphishing is a prominent targeted attack vector in today's Internet. By impersonating
trusted email senders through carefully crafted messages and spoofed metadata …
trusted email senders through carefully crafted messages and spoofed metadata …
Email phishing: Text classification using natural language processing
Phishing is networked theft in which the main motive of phishers is to steal any person's
private information, its financial details like account number, credit card details, login …
private information, its financial details like account number, credit card details, login …
[HTML][HTML] Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation
Social engineering cyber-attacks such as phishing emails pose a serious threat to the safety
of many organizations. Given that the effectiveness of these attacks heavily relies on poor …
of many organizations. Given that the effectiveness of these attacks heavily relies on poor …
Detecting and characterizing SMS spearphishing attacks
Although spearphishing is a well-known security issue and has been widely researched, it is
still an evolving threat with emerging forms. In recent years, Short Message Service (SMS) …
still an evolving threat with emerging forms. In recent years, Short Message Service (SMS) …
Classification of anti-phishing solutions
S Chanti, T Chithralekha - SN Computer Science, 2020 - Springer
Phishing is an online fraud through which phisher gains unauthorized access to the user
system to lure the personal credentials (such as username, password, credit/debit card …
system to lure the personal credentials (such as username, password, credit/debit card …
Improving phishing detection via psychological trait scoring
Phishing emails exhibit some unique psychological traits which are not present in legitimate
emails. From empirical analysis and previous research, we find three psychological traits …
emails. From empirical analysis and previous research, we find three psychological traits …