[HTML][HTML] Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
A survey on cyber-security of connected and autonomous vehicles (CAVs)
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …
[HTML][HTML] Phishing attacks survey: Types, vectors, and technical approaches
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Helphed: Hybrid ensemble learning phishing email detection
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …
tremendous financial losses. Although the methods of confrontation are continually being …
Phishing email detection using natural language processing techniques: a literature survey
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
Chatspamdetector: Leveraging large language models for effective phishing email detection
The proliferation of phishing sites and emails poses significant challenges to existing
cybersecurity efforts. Despite advances in malicious email filters and email security …
cybersecurity efforts. Despite advances in malicious email filters and email security …
A decade of research into the application of big data and analytics in higher education: A systematic review of the literature
The need for data-driven decision-making primarily motivates interest in analysing Big Data
in higher education. Although there has been considerable research on the value of Big …
in higher education. Although there has been considerable research on the value of Big …
Phishing simulation exercise in a large hospital: A case study
Background Phishing is a major threat to the data and infrastructure of healthcare
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …