Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism

Y Fang, C Zhang, C Huang, L Liu, Y Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …

Unbalanced web phishing classification through deep reinforcement learning

A Maci, A Santorsola, A Coscia, A Iannacone - Computers, 2023 - mdpi.com
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to
exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing …

Phishing simulation exercise in a large hospital: A case study

F Rizzoni, S Magalini, A Casaroli, P Mari… - Digital …, 2022 - journals.sagepub.com
Background Phishing is a major threat to the data and infrastructure of healthcare
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …

An explainable multi-modal hierarchical attention model for developing phishing threat intelligence

Y Chai, Y Zhou, W Li, Y Jiang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Phishing website attack, as one of the most persistent forms of cyber threats, evolves and
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …