Machine learning for email spam filtering: review, approaches and open research problems

EG Dada, JS Bassi, H Chiroma, AO Adetunmbi… - Heliyon, 2019 - cell.com
The upsurge in the volume of unwanted emails called spam has created an intense need for
the development of more dependable and robust antispam filters. Machine learning …

A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022 - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

An intelligent cyber security phishing detection system using deep learning techniques

A Mughaid, S AlZu'bi, A Hnaif, S Taamneh, A Alnajjar… - Cluster …, 2022 - Springer
Recently, phishing attacks have become one of the most prominent social engineering
attacks faced by public internet users, governments, and businesses. In response to this …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Detection of phishing websites using an efficient feature-based machine learning framework

RS Rao, AR Pais - Neural Computing and applications, 2019 - Springer
Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive
information such as username, password, social security number or credit card number etc …

[HTML][HTML] Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods

T Li, G Kou, Y Peng - Information Systems, 2020 - Elsevier
In malicious URLs detection, traditional classifiers are challenged because the data volume
is huge, patterns are changing over time, and the correlations among features are …