SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

S Smadi, N Aslam, L Zhang - Decision Support Systems, 2018 - Elsevier
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …

Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

[KNIHA][B] Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Intelligent phishing detection and protection scheme for online transactions

PA Barraclough, MA Hossain, MA Tahir… - Expert systems with …, 2013 - Elsevier
Phishing is an instance of social engineering techniques used to deceive users into giving
their sensitive information using an illegitimate website that looks and feels exactly like the …

Phishing classification techniques: A systematic literature review

R Abdillah, Z Shukur, M Mohd, TMZ Murah - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing has become a serious and concerning problem within the past 10 years, with many
reviews describing attack patterns and anticipating different method utilizations. This …

Phishing email detection based on binary search feature selection

G Sonowal - SN Computer Science, 2020 - Springer
Phishing has appeared as a critical issue in the cybersecurity domain. Phishers adopt email
as one of their major channels of communication to lure potential victims. This paper …

Do users focus on the correct cues to differentiate between phishing and genuine emails?

K Parsons, M Butavicius, M Pattinson, D Calic… - arxiv preprint arxiv …, 2016 - arxiv.org
This paper examines the cues that typically differentiate phishing emails from genuine
emails. The research is conducted in two stages. In the first stage, we identify the cues that …