Ai-Powered Phishing Detection And Prevention
Abstract
Keywords
Full Text:
PDFReferences
1. Bitaab, M., Cho, H., Oest, A., Zhang, P., Sun, Z., Pourmohamad, R., Kim, D., Bao, T., Wang, R., Shoshitaishvili, Y., Doupe, A., & Ahn, G. (2020). Scam Pandemic: How attackers exploit public fear through phishing. Conference: 2020 APWG Symposium on Electronic Crime Research (eCrime). doi: 10.1109/ecrime51433.2020.9493260
2. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2010). The Effect of online privacy information on purchasing behaviour: an experimental study. Information Systems Research, 22(2), 254–268. doi: 10.1287/isre.1090.0260
3. Rao, R. S., & Pais, A. R. (2018). Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications, 31(8), 3851–3873. doi: 10.1007/s00521-017-3305-0
4. Verma, R., & Hossain, N. (2014). Semantic Feature Selection for Text with Application to Phishing Email Detection. In Lecture notes in computer science, 455–468. doi: 10.1007/978-3-319-12160-4_27
5. Bergholz, A., De Beer, J., Glahn, S., Moens, M., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of Computer Security, 18(1), 7–35. doi: 10.3233/jcs-2010-0371
6. Abdelhamid, N., Ayesh, A., & Thabtah, F. (2014). Phishing detection-based Associative Classification data mining. Expert Systems With Applications, 41(13), 5948–5959. doi: 10.1016/j.eswa.2014.03.019
7. Moubayed, A., Injadat, M., Nassif, A. B., Lutfiyya, H., & Shami, A. (2018). E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics. IEEE Access, 6, 39117–39138. doi: 10.1109/access.2018.2851790
8. Bahnsen, A. C., Torroledo, I., Camacho, L. D., & Villegas, S. (2018). DeepPhish: Simulating Malicious AI. Retrieved from https://albahnsen.wordpress.com/wp-content/uploads/2018/05/deepphish-simulating-malicious-ai_submitted.pdf
9. Borate, N. M. V., Adsul, N. D. A., Dhakane, N. M. R., Gawade, N. M. S., Ghodake, N. M. S., & Jadhav, N. M. P. (2024). A comprehensive review of phishing attack detection using machine learning techniques. International Journal of Advanced Research in Science Communication and Technology, 435–441. doi: 10.48175/ijarsct-19963
10. Yuan, C., Xiao, S. S., Geng, C. X. et al. (2021). Digital Transformation and Enterprise Division of Labor: Specialisation or Vertical Integration. China Industrial Economics, 9, 137-155.
11. Karim, A., Shahroz, M., Mustofa, K., Belhaouari, S. B., & Joga, S. R. K. (2023). Phishing detection system through hybrid machine learning based on URL. IEEE Access, 11, 36805–36822. doi: 10.1109/access.2023.3252366
12. Atawneh, S., & Aljehani, H. (2023). Phishing email detection model using Deep learning. Electronics, 12(20), 4261. doi: 10.3390/electronics12204261
13. Devlin, J., Chang, M., Lee, K., & Toutanova, K. (2018). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv (Cornell University). doi: 10.48550/arxiv.1810.04805
14. Alsubaei, F. S., Almazroi, A. A., & Ayub, N. (2024). Enhancing Phishing Detection: A novel hybrid deep learning framework for cybercrime forensics. IEEE Access, 12, 8373–8389. doi: 10.1109/access.2024.3351946
15. Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2018). Machine learning-based phishing detection from URLs. Expert Systems With Applications, 117, 345–357. doi: 10.1016/j.eswa.2018.09.029
16. Biggio, B., & Roli, F. (2018). Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Conference: ACM SIGSAC Conference.
17. Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Predicting phishing websites based on a self-structuring neural network. Neural Computing and Applications, 25(2), 443-458
18. Fares, H., Kilani, J., Fagroud, F., Toumi, H., Lakrami, F., Baddi, Y., & Aknin, N. (2024). Machine learning approach for email phishing detection. Procedia Computer Science, 251, 746–751. doi: 10.1016/j.procs.2024.11.179
19. Guptta, S. D., Shahriar, K. T., Alqahtani, H., Alsalman, D., & Sarker, I. H. (2022). Modelling hybrid Feature-Based phishing website detection using machine learning techniques. Annals of Data Science, 11(1), 217–242. doi: 10.1007/s40745-022-00379-8
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Oladimeji Azeez Lamina, Waliu Adebayo Ayuba, Olubukola Eunice, Adebiyi 3, Gracious Ebunoluwa Michael, Ojo-Omoniyi Damilola Samuel, Keshinro Olushola Samuel

This work is licensed under a Creative Commons Attribution 4.0 International License.



