Phishing Detection

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Authors: Mohammad Amaz Uddin, Iqbal H. Sarker | Published: 2024-02-21
Phishing Detection
Model Interpretability
Model Performance Evaluation

Detecting Scams Using Large Language Models

Authors: Liming Jiang | Published: 2024-02-05
LLM Security
Phishing Detection
Prompt Injection

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

A Modular and Adaptive System for Business Email Compromise Detection

Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21
Business Email Compromise
Phishing Detection
Performance Evaluation

Phishing URL Detection: A Network-based Approach Robust to Evasion

Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03
Dataset Generation
Phishing Detection
Classification Pattern Analysis

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

Authors: Dinil Mon Divakaran, Adam Oest | Published: 2022-05-16
Web Page Content Analysis
Cyber Attack
Phishing Detection

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04
Phishing Detection
Memory Management Method
User Behavior Analysis

A Systematic Literature Review on Phishing and Anti-Phishing Techniques

Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02
Phishing Attack
Phishing Detection
Research Methodology

Automated email Generation for Targeted Attacks using Natural Language

Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19
LSTM Model Performance Evaluation
Training Method
Phishing Detection

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13
Phishing Detection
Feature Interdependence
Anomaly Detection Method