A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Performance benchmarking for simulated phishing attacks

R Belani, A Higbee, S Greaux - US Patent 9,667,645, 2017 - Google Patents
G06F II/00(2006.01) H04L 29/06(2006.01) Described herein are methods, network devices
and (52) US Cl. machine-readable media for conducting a simulated phish CPC...... H04L …

{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound

N Karapanos, C Marforio, C Soriente… - 24th USENIX security …, 2015 - usenix.org
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

Suspicious message processing and incident response

A Higbee, R Belani, S Greaux, W Galway… - US Patent …, 2018 - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents …

Web phishing detection using web crawling, cloud infrastructure and deep learning framework

LM Abdulrahman, SH Ahmed, ZN Rashid… - Journal of Applied …, 2023 - jastt.org
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …

An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank

S Bell, P Komisarczuk - … of the Australasian Computer Science Week …, 2020 - dl.acm.org
Blacklists play a vital role in protecting internet users against phishing attacks. The
effectiveness of blacklists depends on their size, scope, update speed and frequency, and …