A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Web phishing detection using web crawling, cloud infrastructure and deep learning framework

LM Abdulrahman, SH Ahmed, ZN Rashid… - Journal of Applied …, 2023 - jastt.org
The pandemic of COVID-19 obliges citizens to follow the “work from home “scheme. The
Internet is also a powerful channel for social connections. The huge dependency of people …

Performance benchmarking for simulated phishing attacks

R Belani, A Higbee, S Greaux - US Patent 9,667,645, 2017 - Google Patents
Described herein are methods, network devices and machine-readable media for
conducting a simulated phishing attack on a first group of individuals, and performing an …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound

N Karapanos, C Marforio, C Soriente… - 24th USENIX security …, 2015 - usenix.org
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

Seeing-is-believing: Using camera phones for human-verifiable authentication

JM McCune, A Perrig, MK Reiter - 2005 IEEE Symposium on …, 2005 - ieeexplore.ieee.org
Current mechanisms for authenticating communication between devices that share no prior
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …

Suspicious message processing and incident response

A Higbee, R Belani, S Greaux, W Galway… - US Patent …, 2018 - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents …