Machine-generated text: A comprehensive survey of threat models and detection methods
Machine-generated text is increasingly difficult to distinguish from text authored by humans.
Powerful open-source models are freely available, and user-friendly tools that democratize …
Powerful open-source models are freely available, and user-friendly tools that democratize …
A comprehensive survey of AI-enabled phishing attacks detection techniques
In recent times, a phishing attack has become one of the most prominent attacks faced by
internet users, governments, and service-providing organizations. In a phishing attack, the …
internet users, governments, and service-providing organizations. In a phishing attack, the …
A systematic literature review on phishing email detection using natural language processing techniques
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …
economy. Phishing attacks are now most often carried out by email. To better comprehend …
Machine learning based phishing detection from URLs
Due to the rapid growth of the Internet, users change their preference from traditional
shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try …
shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try …
[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …
The consequences of successful phishing include (and are not limited to) financial losses …
Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Deep learning for phishing detection: Taxonomy, current challenges and future directions
Phishing has become an increasing concern and captured the attention of end-users as well
as security experts. Existing phishing detection techniques still suffer from the deficiency in …
as security experts. Existing phishing detection techniques still suffer from the deficiency in …
Host-based IDS: A review and open issues of an anomaly detection system in IoT
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …
and heterogeneity where ensuring reliable services and communications across multiple …