Reinforcement learning for feedback-enabled cyber resilience
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …
surface and made cyber systems more vulnerable. As attackers become increasingly …
Prompted contextual vectors for spear-phishing detection
Spear-phishing attacks present a significant security challenge, with large language models
(LLMs) escalating the threat by generating convincing emails and facilitating target …
(LLMs) escalating the threat by generating convincing emails and facilitating target …
Tegdetector: a phishing detector that knows evolving transaction behaviors
H Zheng, M Ma, H Ma, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, phishing scams have posed a significant threat to blockchains. Phishing detectors
direct their efforts in hunting phishing addresses. Most of the detectors extract target …
direct their efforts in hunting phishing addresses. Most of the detectors extract target …
A Review of AI in Spear Phishing Defense: Detecting and Thwarting Advanced Email Threats
The landscape of cyber threats is constantly changing, with spear phishing representing a
particularly stealthy and prevalent risk. This review paper examines the integration of …
particularly stealthy and prevalent risk. This review paper examines the integration of …
Learning to detect phishing web pages using lexical and string complexity analysis
Phishing is the most common and effective sort of attack employed by cybercriminals to
deceive and steal sensitive information from innocent Web users. Researchers have …
deceive and steal sensitive information from innocent Web users. Researchers have …
Adapting to Cyber Threats: A Phishing Evolution Network (PEN) Framework for Phishing Generation and Analyzing Evolution Patterns using Large Language Models
Phishing remains a pervasive cyber threat, as attackers craft deceptive emails to lure victims
into revealing sensitive information. While Artificial Intelligence (AI), particularly deep …
into revealing sensitive information. While Artificial Intelligence (AI), particularly deep …
Profiler: Profile-Based Model to Detect Phishing Emails
Email phishing has become more prevalent and grows more sophisticated over time. To
combat this rise, many machine learning (ML) algorithms for detecting phishing emails have …
combat this rise, many machine learning (ML) algorithms for detecting phishing emails have …
Phishing Email Detection: Survey
RS MohamedAli, RA Abduhameed - International Conference on …, 2024 - Springer
Phishing emails pose a significant contemporary challenge on the Internet, resulting in
financial losses for organizations and causing frustration for users. Phishing is a deceptive …
financial losses for organizations and causing frustration for users. Phishing is a deceptive …
Analysing the email data using stylometric method and deep learning to mitigate phishing attack
PN Wosah, Q Ali Mirza, W Sayers - International Journal of Information …, 2024 - Springer
The high-volume usage of email has attracted cybercriminals to the platform and criminals
are aware of difficulties users often have in separating legitimate from illegitimate emails and …
are aware of difficulties users often have in separating legitimate from illegitimate emails and …
PhishClone: measuring the efficacy of cloning evasion attacks
Web-based phishing accounts for over 90% of data breaches, and most web-browsers and
security vendors rely on machine-learning (ML) models as mitigation. Despite this, links …
security vendors rely on machine-learning (ML) models as mitigation. Despite this, links …