Detecting phishing attacks using natural language processing and machine learning

T Peng, I Harris, Y Sawa - 2018 ieee 12th international …, 2018 - ieeexplore.ieee.org
Phishing attacks are one of the most common and least defended security threats today. We
present an approach which uses natural language processing techniques to analyze text …

[HTML][HTML] Panning for gold: Automatically analysing online social engineering attack surfaces

M Edwards, R Larson, B Green, A Rashid, A Baron - computers & security, 2017 - Elsevier
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …

[HTML][HTML] An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment

DJ Liu, GG Geng, XB Jin, W Wang - Computers & Security, 2021 - Elsevier
Phishing has become a favorite method of hackers for committing data theft and continues to
evolve. As long as phishing websites continue to operate, many more people and …

Phish responder: A hybrid machine learning approach to detect phishing and spam emails

M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …

Emailprofiler: Spearphishing filtering with header and stylometric features of emails

S Duman, K Kalkan-Cakmakci, M Egele… - 2016 IEEE 40th …, 2016 - ieeexplore.ieee.org
Spearphishing is a prominent targeted attack vector in today's Internet. By impersonating
trusted email senders through carefully crafted messages and spoofed metadata …

Email phishing: Text classification using natural language processing

P Verma, A Goyal, Y Gigras - Computer Science and Information …, 2020 - iaesprime.com
Phishing is networked theft in which the main motive of phishers is to steal any person's
private information, its financial details like account number, credit card details, login …

[HTML][HTML] Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation

N Beu, A Jayatilaka, M Zahedi, MA Babar, L Hartley… - Computers & …, 2023 - Elsevier
Social engineering cyber-attacks such as phishing emails pose a serious threat to the safety
of many organizations. Given that the effectiveness of these attacks heavily relies on poor …

Detecting and characterizing SMS spearphishing attacks

M Liu, Y Zhang, B Liu, Z Li, H Duan, D Sun - Proceedings of the 37th …, 2021 - dl.acm.org
Although spearphishing is a well-known security issue and has been widely researched, it is
still an evolving threat with emerging forms. In recent years, Short Message Service (SMS) …

Classification of anti-phishing solutions

S Chanti, T Chithralekha - SN Computer Science, 2020 - Springer
Phishing is an online fraud through which phisher gains unauthorized access to the user
system to lure the personal credentials (such as username, password, credit/debit card …

Improving phishing detection via psychological trait scoring

S Shahriar, A Mukherjee, O Gnawali - arXiv preprint arXiv:2208.06792, 2022 - arxiv.org
Phishing emails exhibit some unique psychological traits which are not present in legitimate
emails. From empirical analysis and previous research, we find three psychological traits …