[HTML][HTML] Advanced insights through systematic analysis: Map** future research directions and opportunities for xAI in deep learning and artificial intelligence used in …
This paper engages in a comprehensive investigation concerning the application of
Explainable Artificial Intelligence (xAI) within the context of deep learning and Artificial …
Explainable Artificial Intelligence (xAI) within the context of deep learning and Artificial …
Impacts and risk of generative AI technology on cyber defense
Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of
autonomously producing highly realistic content in various domains, such as text, images …
autonomously producing highly realistic content in various domains, such as text, images …
Explanations in warning dialogs to help users defend against phishing attacks
Phishing, the deceptive act of stealing personal and sensitive information by sending
messages that seem to come from trusted entities, is one of the most widespread and …
messages that seem to come from trusted entities, is one of the most widespread and …
LLMs are one-shot URL classifiers and explainers
Malicious URL classification represents a crucial aspect of cybersecurity. Although existing
work comprises numerous machine learning and deep learning-based URL classification …
work comprises numerous machine learning and deep learning-based URL classification …
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal
sensitive user information. Deep learning techniques, particularly convolutional neural …
sensitive user information. Deep learning techniques, particularly convolutional neural …
A Compendium on Risk Assessment of Phishing Attack Using Attack Modeling Techniques
With the advent of new attacking methodologies and types of attacks, it has become difficult
to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and …
to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and …
[PDF][PDF] David versus Goliath: Can Machine Learning Detect LLM-Generated Text? A Case Study in the Detection of Phishing Emails
Abstract Large Language Models (LLMs) offer numerous benefits, but they also pose
threats, such as cybercriminals creating fake, convincing content such as phishing emails …
threats, such as cybercriminals creating fake, convincing content such as phishing emails …
Explainable AI in Cybersecurity: A Comprehensive Framework for enhancing transparency, trust, and Human-AI Collaboration
B Desai, K Patil, I Mehta, A Patil - 2024 International Seminar on …, 2024 - ieeexplore.ieee.org
Explainable AI (XAI) is transforming cybersecurity through increased openness, reliability,
and teamwork among human analysts and AI tools. This comprehensive framework explores …
and teamwork among human analysts and AI tools. This comprehensive framework explores …
Securing Web Technology and Navigation Against Phishing Through CNN
Pervasive connectivity to the Internet paves the way to cyber threats, which are becoming
more sophisticated and difficult to counteract. Phishing attack is one of the oldest, but still …
more sophisticated and difficult to counteract. Phishing attack is one of the oldest, but still …
Investigating Supervised Machine Learning Methodologies for Preventing Phishing Attacks on SCADA Server
A high number of industries utilize supervisory control and data acquisition system for
controlling and monitoring day-to-day operations related to the organization's domain with …
controlling and monitoring day-to-day operations related to the organization's domain with …