Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …
to unlawfully acquire sensitive user information, including passwords, account details, credit …
Canary in twitter mine: collecting phishing reports from experts and non-experts
The rise in phishing attacks via e-mail and short message service (SMS) has not slowed
down at all. The first thing we need to do to combat the ever-increasing number of phishing …
down at all. The first thing we need to do to combat the ever-increasing number of phishing …
PhishLang: A lightweight, client-side phishing detection framework using MobileBERT for real-time, explainable threat mitigation
In this paper, we introduce PhishLang, an open-source, lightweight language model
specifically designed for phishing website detection through contextual analysis of the …
specifically designed for phishing website detection through contextual analysis of the …
Cybersecurity misinformation detection on social media: Case studies on phishing reports and zoom's threat
Prior work has extensively studied misinformation related to news, politics, and health,
however, misinformation can also be about technological topics. While less controversial …
however, misinformation can also be about technological topics. While less controversial …
Piracema: a Phishing snapshot database for building dataset features
JC Gomes de Barros, CM Revoredo da Silva… - Scientific Reports, 2022 - nature.com
Phishing is an attack characterized by attempted fraud against users. The attacker develops
a malicious page that is a trusted environment, inducing its victims to submit sensitive data …
a malicious page that is a trusted environment, inducing its victims to submit sensitive data …
Intellitweet: A multifaceted feature approach to detect malicious tweets
EE Dzeha, GV Jourdan - … Symposium on Foundations and Practice of …, 2023 - Springer
Twitter faces an ongoing issue with malicious tweets from deceptive accounts engaged in
phishing, scams, and spam, negatively impacting the overall Twitter user experience. In …
phishing, scams, and spam, negatively impacting the overall Twitter user experience. In …
'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom
SMS fraud has surged in recent years. Detection techniques have improved along with the
fraud, necessitating harder-to-detect fraud techniques. We study one of these where …
fraud, necessitating harder-to-detect fraud techniques. We study one of these where …
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter
The increase in phishing attacks through email and short message service (SMS) has
shown no signs of deceleration. The first thing we need to do to combat the ever-increasing …
shown no signs of deceleration. The first thing we need to do to combat the ever-increasing …
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding
Twitter is recognized as a crucial platform for the dissemination and gathering of Cyber
Threat Intelligence (CTI). Its capability to provide real-time, actionable intelligence makes it …
Threat Intelligence (CTI). Its capability to provide real-time, actionable intelligence makes it …
The IntelliTweet: Unveiling Malicious Activities in Tweets through a Multifaceted Feature Analysis
E Dzeha - 2024 - ruor.uottawa.ca
Social media platforms have seamlessly integrated into our daily communication, facilitating
information sharing, connections and engagement for both individuals and businesses …
information sharing, connections and engagement for both individuals and businesses …