“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | Published: 2024-04-03 Phishing AttackDetection Rate of Phishing AttacksPhishing Detection 2024.04.03 2025.05.27 Literature Database
Lateral Phishing With Large Language Models: A Large Organization Comparative Study Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18 | Updated: 2025-04-15 Phishing AttackPrompt Injection 2024.01.18 2025.05.27 Literature Database
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services Authors: Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang | Published: 2024-01-06 | Updated: 2024-08-19 Phishing AttackPrompt InjectionMalicious Content Generation 2024.01.06 2025.05.27 Literature Database
Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang | Published: 2023-12-31 CybersecurityPhishing AttackPrompt Injection 2023.12.31 2025.05.27 Literature Database
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models Authors: Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park | Published: 2023-08-23 | Updated: 2023-11-30 PhishingPhishing AttackPrompt Injection 2023.08.23 2025.05.28 Literature Database
Spear Phishing With Large Language Models Authors: Julian Hazell | Published: 2023-05-11 | Updated: 2023-12-22 Cyber AttackPhishing AttackPrompt Injection 2023.05.11 2025.05.28 Literature Database
Profiler: Profile-Based Model to Detect Phishing Emails Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18 Phishing AttackDetection Rate of Phishing AttacksMachine Learning Technology 2022.08.18 2025.05.28 Literature Database
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28 CybersecurityNetwork Node ConfigurationPhishing Attack 2022.04.28 2025.05.28 Literature Database
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27 CybersecurityPhishing AttackAttack Method 2022.04.27 2025.05.28 Literature Database
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27 WatermarkingPhishing AttackVisual Similarity Detection 2022.04.27 2025.05.28 Literature Database