Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
A survey on cyber-security of connected and autonomous vehicles (CAVs)
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
A study on the psychology of social engineering-based cyberattacks and existing countermeasures
MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
Helphed: Hybrid ensemble learning phishing email detection
P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
Phishing email detection using natural language processing techniques: a literature survey
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
Y Fang, C Zhang, C Huang, L Liu, Y Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …
tremendous financial losses. Although the methods of confrontation are continually being …
Unbalanced web phishing classification through deep reinforcement learning
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to
exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing …
exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing …
Phishing simulation exercise in a large hospital: A case study
F Rizzoni, S Magalini, A Casaroli, P Mari… - Digital …, 2022 - journals.sagepub.com
Background Phishing is a major threat to the data and infrastructure of healthcare
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …
An explainable multi-modal hierarchical attention model for developing phishing threat intelligence
Phishing website attack, as one of the most persistent forms of cyber threats, evolves and
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …