Machine learning for email spam filtering: review, approaches and open research problems
The upsurge in the volume of unwanted emails called spam has created an intense need for
the development of more dependable and robust antispam filters. Machine learning …
the development of more dependable and robust antispam filters. Machine learning …
A systematic literature review on phishing email detection using natural language processing techniques
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …
economy. Phishing attacks are now most often carried out by email. To better comprehend …
[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …
information online. As a result, an enormous amount of personal information and financial …
Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
An intelligent cyber security phishing detection system using deep learning techniques
Recently, phishing attacks have become one of the most prominent social engineering
attacks faced by public internet users, governments, and businesses. In response to this …
attacks faced by public internet users, governments, and businesses. In response to this …
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
Detection of phishing websites using an efficient feature-based machine learning framework
Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive
information such as username, password, social security number or credit card number etc …
information such as username, password, social security number or credit card number etc …
[HTML][HTML] Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods
In malicious URLs detection, traditional classifiers are challenged because the data volume
is huge, patterns are changing over time, and the correlations among features are …
is huge, patterns are changing over time, and the correlations among features are …