A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Phishing detection leveraging machine learning and deep learning: A review
Phishing attacks trick victims into disclosing sensitive information. To counter them, we
explore machine learning and deep learning models leveraging large-scale data. We …
explore machine learning and deep learning models leveraging large-scale data. We …
Phishing or not phishing? A survey on the detection of phishing websites
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …
brands. Although this threat has been around for quite a long time, it is still very active and …
Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages
Recent years have seen the development of phishing detection and identification
approaches to defend against phishing attacks. Phishing detection solutions often report …
approaches to defend against phishing attacks. Phishing detection solutions often report …
[PDF][PDF] Double and nothing: Understanding and detecting cryptocurrency giveaway scams
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …
Generating phishing attacks using chatgpt
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …
it a popular tool for conversational agents, content creation, data analysis, and research and …
Beyond bot detection: combating fraudulent online survey takers✱
Different techniques have been recommended to detect fraudulent responses in online
surveys, but little research has been taken to systematically test the extent to which they …
surveys, but little research has been taken to systematically test the extent to which they …
Conning the crypto conman: End-to-end analysis of cryptocurrency-based technical support scams
The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues
reported by ordinary users on social media platforms. In parallel, there is an increase in an …
reported by ordinary users on social media platforms. In parallel, there is an increase in an …
Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …
account compromise can be particularly devastating. In a world fraught with data breaches …
Scam pandemic: How attackers exploit public fear through phishing
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …