[HTML][HTML] A systematic review on deep-learning-based phishing email detection

K Thakur, ML Ali, MA Obaidat, A Kamruzzaman - Electronics, 2023 - mdpi.com
Phishing attacks are a growing concern for individuals and organizations alike, with the
potential to cause significant financial and reputational damage. Traditional methods for …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …

Phishing detection: analysis of visual similarity based approaches

AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

A novel approach to protect against phishing attacks at client side using auto-updated white-list

AK Jain, BB Gupta - EURASIP Journal on Information Security, 2016 - Springer
Most of the anti-phishing solutions are having two major limitations; the first is the need of a
fast access time for a real-time environment and the second is the need of high detection …

PHISH-SAFE: URL features-based phishing detection system using machine learning

AK Jain, BB Gupta - Cyber Security: Proceedings of CSI 2015, 2018 - Springer
Today, phishing is one of the most serious cyber-security threat in which attackers steal
sensitive information such as personal identification number (PIN), credit card details, login …

A recent review of conventional vs. automated cybersecurity anti-phishing techniques

I Qabajeh, F Thabtah, F Chiclana - Computer Science Review, 2018 - Elsevier
In the era of electronic and mobile commerce, massive numbers of financial transactions are
conducted online on daily basis, which created potential fraudulent opportunities. A common …

[HTML][HTML] Cyber resilience in firms, organizations and societies

K Hausken - Internet of Things, 2020 - Elsevier
Cyber resilience involves most societal actors, ie organizations, individuals, threat actors,
governments, insurers, etc., at most levels of organization. Actors are embedded within each …