[HTML][HTML] Advanced insights through systematic analysis: Map** future research directions and opportunities for xAI in deep learning and artificial intelligence used in …

M Pawlicki, A Pawlicka, R Kozik, M Choraś - Neurocomputing, 2024 - Elsevier
This paper engages in a comprehensive investigation concerning the application of
Explainable Artificial Intelligence (xAI) within the context of deep learning and Artificial …

Impacts and risk of generative AI technology on cyber defense

S Neupane, IA Fernandez, S Mittal… - arxiv preprint arxiv …, 2023 - arxiv.org
Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of
autonomously producing highly realistic content in various domains, such as text, images …

Explanations in warning dialogs to help users defend against phishing attacks

G Desolda, J Aneke, C Ardito, R Lanzilotti… - International Journal of …, 2023 - Elsevier
Phishing, the deceptive act of stealing personal and sensitive information by sending
messages that seem to come from trusted entities, is one of the most widespread and …

LLMs are one-shot URL classifiers and explainers

F Rashid, N Ranaweera, B Doyle, S Seneviratne - Computer Networks, 2025 - Elsevier
Malicious URL classification represents a crucial aspect of cybersecurity. Although existing
work comprises numerous machine learning and deep learning-based URL classification …

A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)

MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal
sensitive user information. Deep learning techniques, particularly convolutional neural …

A Compendium on Risk Assessment of Phishing Attack Using Attack Modeling Techniques

R Lohiya, A Thakkar - Procedia Computer Science, 2024 - Elsevier
With the advent of new attacking methodologies and types of attacks, it has become difficult
to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and …

[PDF][PDF] David versus Goliath: Can Machine Learning Detect LLM-Generated Text? A Case Study in the Detection of Phishing Emails

F Greco, G Desolda, A Esposito… - The Italian Conference …, 2024 - researchgate.net
Abstract Large Language Models (LLMs) offer numerous benefits, but they also pose
threats, such as cybercriminals creating fake, convincing content such as phishing emails …

Explainable AI in Cybersecurity: A Comprehensive Framework for enhancing transparency, trust, and Human-AI Collaboration

B Desai, K Patil, I Mehta, A Patil - 2024 International Seminar on …, 2024 - ieeexplore.ieee.org
Explainable AI (XAI) is transforming cybersecurity through increased openness, reliability,
and teamwork among human analysts and AI tools. This comprehensive framework explores …

Securing Web Technology and Navigation Against Phishing Through CNN

C Catalano, A Chezzi, V Santa Barletta… - … on Metrology for …, 2023 - ieeexplore.ieee.org
Pervasive connectivity to the Internet paves the way to cyber threats, which are becoming
more sophisticated and difficult to counteract. Phishing attack is one of the oldest, but still …

Investigating Supervised Machine Learning Methodologies for Preventing Phishing Attacks on SCADA Server

A Kumari, I Sharma - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
A high number of industries utilize supervisory control and data acquisition system for
controlling and monitoring day-to-day operations related to the organization's domain with …