Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Badis Hammi, Tristan Bilot, Danyil Bazain, Nicolas Binand, Maxime Jaen, Chems Mitta, Nour El Madhoun |
An End-to-End Approach for the Detection of Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 314-325, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu 0001, Issa Khalil |
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Meas. Anal. Comput. Syst. ![In: Proc. ACM Meas. Anal. Comput. Syst. 7(3), pp. 59:1-59:26, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Alper Ozcan, Cagatay Catal, Emrah Donmez, Behcet Senturk |
A hybrid DNN-LSTM model for detecting phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 35(7), pp. 4957-4973, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Noor Syahirah Nordin, Mohd Arfian Ismail |
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 35(7), pp. 5501-5512, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Mahdi Bahaghighat, Majid Ghasemi, Figen Özen |
A high-accuracy phishing website detection method based on machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 77, pp. 103553, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Choon Lin Tan, Kang-Leng Chiew, Kelvin S. C. Yong, Yakub Sebastian, Joel Chia Ming Than, Wei King Tiong |
Hybrid phishing detection using joint visual and textual identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 220, pp. 119723, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Tingke Wen, Yuanxing Xiao, Anqi Wang, Haizhou Wang |
A novel hybrid feature fusion model for detecting phishing scam on Ethereum using deep neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 211, pp. 118463, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Said A. Salloum, Tarek Gaber, Sunil Vadera, Khaled Shaalan |
A New English/Arabic Parallel Corpus for Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Asian Low Resour. Lang. Inf. Process. ![In: ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(7), pp. 201:1-201:17, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Manoj Kumar Prabakaran, Parvathy Meenakshi Sundaram, Abinaya Devi Chandrasekar |
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(3), pp. 423-440, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | C. Rajeswary, M. Thirumaran |
The LSTM-based automated phishing detection driven model for detecting multiple attacks on Tor hidden services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 44(6), pp. 8889-8903, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Minh-Khoi Le-Nguyen, Tri-Chan-Hung Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, Long-Phuoc Tôn, Khuong Nguyen-An |
Phishing Website Detection as a Website Comparing Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(2), pp. 122, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Mohd Shoaib, Mohammad Sarosh Umar |
Phishing detection model using feline finch optimisation-based LSTM classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Sens. Networks ![In: Int. J. Sens. Networks 42(4), pp. 205-220, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Pankaj Pandey, Nishchol Mishra |
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(4), pp. 881-891, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rania Zaimi, Mohamed Hafidi, Mahnane Lamia |
A deep learning approach to detect phishing websites using CNN for privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Decis. Technol. ![In: Intell. Decis. Technol. 17(3), pp. 713-728, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Brent Pethers, Abubakar Bello |
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(1), pp. 29, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello |
SoK: Human-centered Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 26(3), pp. 24:1-24:27, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sarika Gupta, Himani Bansal |
Trust evaluation of health websites by eliminating phishing websites and using similarity techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(21), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rei Yamagishi, Shota Fujii |
An Analysis of Susceptibility to Phishing via Business Chat through Online Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 31, pp. 609-619, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ashraf Hamdan Aljammal, Salah Taamneh, Ahmad Qawasmeh, Hani Bani-Salameh |
Machine Learning Based Phishing Attacks Detection Using Multiple Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interact. Mob. Technol. ![In: Int. J. Interact. Mob. Technol. 17(5), pp. 71-83, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Haifeng Lv, Yong Ding 0005 |
Phishing detection on Ethereum via transaction subgraphs embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Blockchain ![In: IET Blockchain 3(4), pp. 194-203, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Erzhou Zhu, Qixiang Yuan, Zhile Chen, Xuejian Li, Xianyong Fang |
CCBLA: a Lightweight Phishing Detection Model Based on CNN, BiLSTM, and Attention Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Comput. ![In: Cogn. Comput. 15(4), pp. 1320-1333, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana, Haonan Wang |
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 16(4), pp. 2411-2422, July - August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Musarrat Hussain, Chi Cheng, Rui Xu, Muhammad Afzal 0001 |
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 631, pp. 328-345, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Minyoung Lee, Eunil Park |
Real-time Korean voice phishing detection based on machine learning approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(7), pp. 8173-8184, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sajjad Jalil, Muhammad Usman 0005, Alvis Cheuk M. Fong |
Highly accurate phishing URL detection based on machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(7), pp. 9233-9251, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | S. Priya, S. Selvakumar 0001, R. Leela Velusamy |
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(3), pp. 1951-1975, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rahmad Abdillah, Zarina Shukur, Masnizah Mohd, Mohd Zamri Murah, Insu Oh, Kangbin Yim |
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 38721-38738, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Abdul Karim, Mobeen Shahroz, Khabib Mustofa, Samir Brahim Belhaouari, S. Ramana Kumar Joga |
Phishing Detection System Through Hybrid Machine Learning Based on URL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 36805-36822, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Hyunjun Park, Kyungchan Lim, Doowon Kim, Donghyun Yu, Hyungjoon Koo |
Demystifying the Regional Phishing Landscape in South Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 130131-130143, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sultan Asiri, Yang Xiao 0001, Saleh Alzahrani, Shuhui Li 0001, Tieshan Li |
A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 6421-6443, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Lakshmana Rao Kalabarige, Routhu Srinivasa Rao, Alwyn R. Pais, Lubna Abdel Kareim Gabralla |
A Boosting-Based Hybrid Feature Selection and Multi-Layer Stacked Ensemble Learning Model to Detect Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 71180-71193, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Alima Nzeket Njoya, Vanelle Laure Tchaya Ngongag, Franklin Tchakounté, Marcellin Atemkeng, Claude Fachkha |
Characterizing Mobile Money Phishing Using Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 103839-103862, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Wenhao Li, Selvakumar Manickam, Sham-ul-Arfeen Laghari, Yung-Wey Chong |
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 71925-71939, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Kholoud Althobaiti, Maria K. Wolters, Nawal Alsufyani, Kami Vaniea |
Using Clustering Algorithms to Automatically Identify Phishing Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 96502-96513, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | T. Kalaichelvi, Sulakshana B. Mane, K. M. Dhanalakshmi, S. Narasimha Prasad |
The detection of phishing attempts in communications systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 15(5), pp. 541-553, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Theyab R. Alsenani, Safial Islam Ayon, Sayeda Mayesha Yousuf, Fahad Bin Kamal Anik, Mohammad Ehsan Shahmi Chowdhury |
Intelligent feature selection model based on particle swarm optimization to detect phishing websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(29), pp. 44943-44975, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ashish Kumar Jha, Raja Muthalagu, Pranav M. Pawar |
Intelligent phishing website detection using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(19), pp. 29431-29456, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Haixian Wen, Junyuan Fang, Jiajing Wu, Zibin Zheng |
Hide and Seek: An Adversarial Hiding Approach Against Phishing Detection on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 10(6), pp. 3512-3523, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Pierre-Emmanuel Arduin |
A cognitive approach to the decision to trust or distrust phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Trans. Oper. Res. ![In: Int. Trans. Oper. Res. 30(3), pp. 1263-1298, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jingxian Zhou, Haibin Cui, Xina Li, Wenjin Yang, Xi Wu |
A Novel Phishing Website Detection Model Based on LightGBM and Domain Name Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 15(1), pp. 180, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Moruf Akin Adebowale, Khin T. Lwin, M. Alamgir Hossain |
Intelligent phishing detection scheme using deep learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Enterp. Inf. Manag. ![In: J. Enterp. Inf. Manag. 36(3), pp. 747-766, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Lei Wang 0042, Ming Xu, Hao Cheng |
Phishing scams detection via temporal graph attention network in Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Manag. ![In: Inf. Process. Manag. 60(4), pp. 103412, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shilpa Mahajan |
Phishing uniform resource locator detection using machine learning: A step towards secure system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 6(6), November/December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Munmun Bhattacharya, Sandip Roy 0001, Samiran Chattopadhyay, Ashok Kumar Das, Sajjad Shaukat Jamal |
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(1), pp. 234-245, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Marwa-Aqa Abd Al Hussein Qasim, Nahla A. Flayh |
Enhancing Phishing Website Detection via Feature Selection in URL-Based Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 47(8), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Asadullah Safi, Satwinder Singh |
A systematic literature review on phishing website detection techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(2), pp. 590-611, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone |
Unbalanced Web Phishing Classification through Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(6), pp. 118, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Mohamad Reza Davoudi, Alireza Yari |
Improving the Feature Section Method Based on Genetic Algorithm to Increase the Efficiency of Detecting Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 57(3), pp. 213-221, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Bader Hamad AlOwaimer, Deepak Dahiya |
Performance Investigation of Phishing Website Detection by Improved Deep Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 132(4), pp. 2625-2644, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Edwin Donald Frauenstein, Stephen Flowerday, Syden Mishi, Merrill Warkentin |
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 60(7), pp. 103858, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein |
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.12287, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Wenjia Yu, Yijun Xia, Jieli Liu, Jiajing Wu |
Streaming phishing scam detection method on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.16624, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rodolfo V. Valentim, Idilio Drago, Marco Mellia, Federico Cerutti 0001 |
Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.07005, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Krystal Alex Jackson |
A Systematic Review of Machine Learning Enabled Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.06998, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis |
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.03498, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Suhaima Jamal, Hayden Wimmer |
An Improved Transformer-based Model for Detecting Phishing, Spam, and Ham: A Large Language Model Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.04913, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Hiroki Nakano, Daiki Chiba 0001, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto |
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.15847, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Nmachi Peace Wosah |
A framework for securing email entrances and mitigating phishing impersonation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04100, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Julian Hazell |
Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.06972, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello |
What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.00664, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba 0001 |
Detecting Phishing Sites Using ChatGPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.05816, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Marc Schmitt 0001, Ivan Flechais |
Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.13715, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sarah Wassermann, Maxime Meyer, Sébastien Goutal, Damien Riquet |
Targeted Attacks: Redefining Spear Phishing and Business Email Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.14166, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio |
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.03166, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino |
A Large-Scale Study of Phishing PDF Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.01273, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Nils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski |
Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.10463, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran |
Attacking logo-based phishing website detectors with adversarial perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.09392, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | |
With Trail to Follow: Measurements of Real-world Non-fungible Token Phishing Attacks on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.01579, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sayak Saha Roy, Dipanjan Das 0002, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh |
Demystifying NFT Promotion and Phishing Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.09806, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sayak Saha Roy, Krishna Vamsi Naragam, Shirin Nilizadeh |
Generating Phishing Attacks using ChatGPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.05133, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Rabimba Karanjai |
Targeted Phishing Campaigns using Large Scale Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.00665, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu |
Personalized Guidelines for Design, Implementation and Evaluation of Anti-phishing Interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.12827, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yasmeen Abdrabou, Felix Dietz, Ahmed Shams, Pascal Knierim, Yomna Abdelrahman, Ken Pfeuffer, Mariam Hassib, Florian Alt |
Revealing the Hidden Effects of Phishing Emails: An Analysis of Eye and Mouse Movements in Email Sorting Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.17044, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ajka Draganovic, Savino Dambra, Javier Aldana-Iuit, Kevin A. Roundy, Giovanni Apruzzese |
"Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.16383, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh |
From Chatbots to PhishBots? - Preventing Phishing scams created using ChatGPT, Google Bard and Claude. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.19181, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Panagiotis Bountakas, Christos Xenakis |
HELPHED: Hybrid Ensemble Learning PHishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 210, pp. 103545, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Luka Jovanovic, Dijana Jovanovic, Milos Antonijevic, Bosko Nikolic, Nebojsa Bacanin, Miodrag Zivkovic, Ivana Strumberger |
Improving Phishing Website Detection Using a Hybrid Two-level Framework for Feature Selection and XGBoost Tuning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Web Eng. ![In: J. Web Eng. 22(3), pp. 543-574, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yun Wan, Feng Xiao, Dapeng Zhang |
Early-stage phishing detection on the Ethereum transaction network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 27(7), pp. 3707-3719, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | A. Aldo Tenis, R. Santhosh |
Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 47(2), pp. 2625-2641, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ashit Kumar Dutta, T. Meyyappan, Basit Qureshi, Majed Alsanea, Anas Waleed Abulfaraj, Manal Al Faraj, Abdul Rahaman Wahab Sait |
Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 44(3), pp. 2701-2713, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Kacper T. Gradon |
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 21(3), pp. 58-61, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Tianhao Xu, Prashanth Rajivan |
Determining psycholinguistic features of deception in phishing messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 31(2), pp. 199-220, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jonas Kainzinger |
Strafbarkeit des Phishing nach persönlichen Daten: § 42 Abs. 2 BDSG als letzter "Rettungsanker"? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. und Recht ![In: Comput. und Recht 39(3), pp. 203-208, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Christopher Nguyen, Matthew L. Jensen, Eric Day |
Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Inf. Syst. ![In: Eur. J. Inf. Syst. 32(2), pp. 238-262, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Beibei Li 0002, Peiran Wang, Zerui Shao, Ao Liu, Yukun Jiang, Yizhou Li |
Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 147, pp. 136-148, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sebastian Hobert, Asbjørn Følstad, Effie Lai-Chong Law |
Chatbots for active learning: A case of phishing email identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Stud. ![In: Int. J. Hum. Comput. Stud. 179, pp. 103108, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jude Buckley, Danielle M. Lottridge, J. G. Murphy, Paul M. Corballis |
Indicators of employee phishing email behaviours: Intuition, elaboration, attention, and email typology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Stud. ![In: Int. J. Hum. Comput. Stud. 172, pp. 102996, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Giuseppe Desolda, Joseph Aneke, Carmelo Ardito, Rosa Lanzilotti, Maria Francesca Costabile |
Explanations in warning dialogs to help users defend against phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Stud. ![In: Int. J. Hum. Comput. Stud. 176, pp. 103056, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Chuan (Annie) Tian, Matthew L. Jensen, Alexandra Durcikova |
Phishing susceptibility across industries: The differential impact of influence techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 135, pp. 103487, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Bilal Naqvi, Kseniia Perova, Ali Farooq 0001, Imran Makhdoom, Shola Oyedeji, Jari Porras |
Mitigation strategies against the phishing attacks: A systematic literature review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 132, pp. 103387, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo |
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 135, pp. 103479, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Wenjing Lei, Siqi Hu, Carol Hsu 0001 |
Unveiling the process of phishing precautions taking: The moderating role of optimism bias. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 129, pp. 103249, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jay Doshi, Kunal Parmar, Raj Sanghavi, Narendra Shekokar |
A comprehensive dual-layer architecture for phishing and spam email detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 133, pp. 103378, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ahmet Selman Bozkir, Firat Coskun Dalgic, Murat Aydos |
GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 124, pp. 102964, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Kuldeep Singh 0005, Palvi Aggarwal, Prashanth Rajivan, Cleotilde Gonzalez |
Cognitive elements of learning and discriminability in anti-phishing training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 127, pp. 103105, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Doron Hillman, Yaniv Harel, Eran Toch |
Evaluating organizational phishing awareness training on an enterprise scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 132, pp. 103364, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Raphael Hoheisel, Guido van Capelleveen, Dipti K. Sarmah, Marianne Junger |
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 128, pp. 103158, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Eman Abdullah Aldakheel, Mohammed Zakariah, Ghada Abdalaziz Gashgari, Fahdah A. Almarshad, Abdullah I. A. Alzahrani |
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(9), pp. 4403, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Muhammad Waqas Shaukat, Rashid Amin, Muhana Magboul Ali Muslam, Asma Hassan Alshehri, Jiang Xie 0001 |
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(19), pp. 8070, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jaehyeon Kim, Sejong Lee, Yushin Kim, Seyoung Ahn, Sunghyun Cho |
Graph Learning-Based Blockchain Phishing Account Detection with a Heterogeneous Transaction Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(1), pp. 463, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|