[HTML][HTML] Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022‏ - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022‏ - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

A survey on cyber-security of connected and autonomous vehicles (CAVs)

X Sun, FR Yu, P Zhang - IEEE Transactions on Intelligent …, 2021‏ - ieeexplore.ieee.org
As the general development trend of the automotive industry, connected and autonomous
vehicles (CAVs) can be used to increase transportation safety, promote mobility choices …

[HTML][HTML] Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020‏ - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Helphed: Hybrid ensemble learning phishing email detection

P Bountakas, C Xenakis - Journal of network and computer applications, 2023‏ - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …

Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism

Y Fang, C Zhang, C Huang, L Liu, Y Yang - Ieee Access, 2019‏ - ieeexplore.ieee.org
The phishing email is one of the significant threats in the world today and has caused
tremendous financial losses. Although the methods of confrontation are continually being …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021‏ - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Chatspamdetector: Leveraging large language models for effective phishing email detection

T Koide, N Fukushi, H Nakano, D Chiba - arxiv preprint arxiv:2402.18093, 2024‏ - arxiv.org
The proliferation of phishing sites and emails poses significant challenges to existing
cybersecurity efforts. Despite advances in malicious email filters and email security …

A decade of research into the application of big data and analytics in higher education: A systematic review of the literature

A Stojanov, BK Daniel - Education and information technologies, 2024‏ - Springer
The need for data-driven decision-making primarily motivates interest in analysing Big Data
in higher education. Although there has been considerable research on the value of Big …

Phishing simulation exercise in a large hospital: A case study

F Rizzoni, S Magalini, A Casaroli, P Mari… - Digital …, 2022‏ - journals.sagepub.com
Background Phishing is a major threat to the data and infrastructure of healthcare
organizations and many cyberattacks utilize this socially engineered pathway. Phishing …