A systematic literature review on phishing email detection using natural language processing techniques
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …
economy. Phishing attacks are now most often carried out by email. To better comprehend …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Web phishing detection using web crawling, cloud infrastructure and deep learning framework
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …
Internet is also a powerful channel for social connections. The huge dependency of people …
Performance benchmarking for simulated phishing attacks
R Belani, A Higbee, S Greaux - US Patent 9,667,645, 2017 - Google Patents
Described herein are methods, network devices and machine-readable media for
conducting a simulated phishing attack on a first group of individuals, and performing an …
conducting a simulated phishing attack on a first group of individuals, and performing an …
Phishing email detection using natural language processing techniques: a literature survey
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …
users, however, prefer password-only authentication. One reason why twofactor …
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
Seeing-is-believing: Using camera phones for human-verifiable authentication
Current mechanisms for authenticating communication between devices that share no prior
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …
Suspicious message processing and incident response
A Higbee, R Belani, S Greaux, W Galway… - US Patent …, 2018 - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents …
US9906539B2 - Suspicious message processing and incident response - Google Patents …