Less defined knowledge and more true alarms: Reference-based phishing detection without a pre-defined reference list

R Liu, Y Lin, X Teoh, G Liu, Z Huang… - 33rd USENIX Security …, 2024 - usenix.org
Phishing, a pervasive form of social engineering attack that compromises user credentials,
has led to significant financial losses and undermined public trust. Modern phishing …

Advancements of SMS Spam Detection: A Comprehensive Survey of NLP and ML Techniques

MR Al Saidat, SY Yerima, K Shaalan - Procedia Computer Science, 2024 - Elsevier
In the digital age, the ubiquity of text messaging has unfortunately paved the way for SMS
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …

Classifying swahili smishing attacks for mobile money users: A machine-learning approach

IS Mambina, JD Ndibwile, KF Michael - IEEE Access, 2022 - ieeexplore.ieee.org
Due to the massive adoption of mobile money in Sub-Saharan countries, the global
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …

On sms phishing tactics and infrastructure

A Nahapetyan, S Prasad, K Childs… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
In 2022, the Anti-Phishing Working Group reported a 70% increase in SMS and voice
phishing attacks. Hard data on SMS phishing is hard to come by, as are insights into how …

Canary in twitter mine: Collecting phishing reports from experts and non-experts

H Nakano, D Chiba, T Koide, N Fukushi… - Proceedings of the 18th …, 2023 - dl.acm.org
The rise in phishing attacks via e-mail and short message service (SMS) has not slowed
down at all. The first thing we need to do to combat the ever-increasing number of phishing …

Phishreplicant: A language model-based approach to detect generated squatting domain names

T Koide, N Fukushi, H Nakano, D Chiba - Proceedings of the 39th …, 2023 - dl.acm.org
Domain squatting is a technique used by attackers to create domain names for phishing
sites. In recent phishing attempts, we have observed many domain names that use multiple …

[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection

Y Yuan, G Apruzzese, M Conti - Computers & Security, 2025 - Elsevier
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …

Detecting illegal online gambling (IOG) services in the mobile environment

M Min, JJ Lee, K Lee - Security and Communication Networks, 2022 - Wiley Online Library
Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken
by government authorities have had little effect in halting these operations. In order to …

A Machine Learning Approach for Efficient Spam Detection in Short Messaging System (SMS)

RG de Luna, VC Magnaye, RAL Reaño… - TENCON 2023-2023 …, 2023 - ieeexplore.ieee.org
Short Message Service (SMS) is a generally used communication method due to its
convenience and affordability. SMS spam message is an unauthorized text message that …

Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions.

N Mohamed, H Taherdoost… - EAI Endorsed …, 2025 - search.ebscohost.com
This paper presents a critical analysis of the role of Artificial Intelligence (AI) in defending
against spear phishing attacks, which continue to be a significant cybersecurity threat. By …