Machine-generated text: A comprehensive survey of threat models and detection methods

EN Crothers, N Japkowicz, HL Viktor - IEEE Access, 2023 - ieeexplore.ieee.org
Machine-generated text is increasingly difficult to distinguish from text authored by humans.
Powerful open-source models are freely available, and user-friendly tools that democratize …

A comprehensive survey of AI-enabled phishing attacks detection techniques

A Basit, M Zafar, X Liu, AR Javed, Z Jalil… - Telecommunication …, 2021 - Springer
In recent times, a phishing attack has become one of the most prominent attacks faced by
internet users, governments, and service-providing organizations. In a phishing attack, the …

A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

Machine learning based phishing detection from URLs

OK Sahingoz, E Buber, O Demir, B Diri - Expert Systems with Applications, 2019 - Elsevier
Due to the rapid growth of the Internet, users change their preference from traditional
shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try …

[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …

Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Deep learning for phishing detection: Taxonomy, current challenges and future directions

NQ Do, A Selamat, O Krejcar, E Herrera-Viedma… - Ieee …, 2022 - ieeexplore.ieee.org
Phishing has become an increasing concern and captured the attention of end-users as well
as security experts. Existing phishing detection techniques still suffer from the deficiency in …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …