A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

Cloud-based email phishing attack using machine and deep learning algorithm

UA Butt, R Amin, H Aldabbas, S Mohan… - Complex & Intelligent …, 2023 - Springer
Cloud computing refers to the on-demand availability of personal computer system assets,
specifically data storage and processing power, without the client's input. Emails are …

Enhancing phishing detection: A novel hybrid deep learning framework for cybercrime forensics

FS Alsubaei, AA Almazroi, N Ayub - IEEE Access, 2024 - ieeexplore.ieee.org
Protecting against interference is essential at a time when wireless communications are
essential for sending large amounts of data. Our research presents a novel deep learning …

[HTML][HTML] Phish responder: A hybrid machine learning approach to detect phishing and spam emails

M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …

Analysis and prevention of AI-based phishing email attacks

CS Eze, L Shamir - Electronics, 2024 - mdpi.com
Phishing email attacks are among the most common and most harmful cybersecurity attacks.
With the emergence of generative AI, phishing attacks can be based on emails generated …

Cognitive elements of learning and discriminability in anti-phishing training

K Singh, P Aggarwal, P Rajivan, C Gonzalez - Computers & Security, 2023 - Elsevier
People adjust decisions based on their experiences; and it is important to know how to
shape these experiences effectively to improve their future decisions. We conducted …

Cybernetic Deception: Unraveling the Layers of Email Phishing Threats

HM Zangana, AK Mohammed, AB Sallow… - International Journal of …, 2024 - ojs.unikom.ac.id
E-mail phishing, a tireless and versatile cybersecurity risk, requires a intensive examination
to fortify organizational resistances. This broad survey dives into the multifaceted …

The application of the bert transformer model for phishing email classification

DO Otieno, AS Namin, KS Jones - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
Phishing attacks pose serious challenges to users, commercial institutions and governments
alike including identity theft, companies and government secrets. The weakest link in any …

Navigating the cyber landscape: A framework for transitioning from business continuity to digital resilience

S Zighan - 2024 2nd International Conference on Cyber …, 2024 - ieeexplore.ieee.org
This conceptual research paper highlights the need for organizations to evolve beyond
traditional business continuity and cybersecurity approaches in the face of escalating digital …