A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Phishing detection leveraging machine learning and deep learning: A review

DM Divakaran, A Oest - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
Phishing attacks trick victims into disclosing sensitive information. To counter them, we
explore machine learning and deep learning models leveraging large-scale data. We …

Phishing or not phishing? A survey on the detection of phishing websites

R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …

Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages

Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan… - 30th USENIX Security …, 2021 - usenix.org
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …

[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023 - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Generating phishing attacks using chatgpt

SS Roy, KV Naragam, S Nilizadeh - arxiv preprint arxiv:2305.05133, 2023 - arxiv.org
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …

Beyond bot detection: combating fraudulent online survey takers✱

Z Zhang, S Zhu, J Mink, A **ong, L Song… - Proceedings of the ACM …, 2022 - dl.acm.org
Different techniques have been recommended to detect fraudulent responses in online
surveys, but little research has been taken to systematically test the extent to which they …

Conning the crypto conman: End-to-end analysis of cryptocurrency-based technical support scams

B Acharya, M Saad, AE Cinà… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues
reported by ordinary users on social media platforms. In parallel, there is an increase in an …

Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting

X Lin, P Ilia, S Solanki, J Polakis - 31st USENIX Security Symposium …, 2022 - usenix.org
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …

Scam pandemic: How attackers exploit public fear through phishing

M Bitaab, H Cho, A Oest, P Zhang, Z Sun… - … on Electronic Crime …, 2020 - ieeexplore.ieee.org
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …