2022
DOI: 10.1007/s40747-022-00760-3
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based email phishing attack using machine and deep learning algorithm

Abstract: Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 26 publications
(9 reference statements)
0
19
0
Order By: Relevance
“…Because medical records and information are now stored in disparate data formats, they are typically kept in comma-separated values (CSV) or table data format and can simply be stored on platforms utilizing these data formats [ 21 ]. The upload of data to the cloud is performed using DataX offline data synchronization software.…”
Section: Anesthesiology Decision Analysis Platformmentioning
confidence: 99%
“…Because medical records and information are now stored in disparate data formats, they are typically kept in comma-separated values (CSV) or table data format and can simply be stored on platforms utilizing these data formats [ 21 ]. The upload of data to the cloud is performed using DataX offline data synchronization software.…”
Section: Anesthesiology Decision Analysis Platformmentioning
confidence: 99%
“…Butt et al [8] This paper proposes utilising SVM, LSTM, RF, LR, ANN, and NB algorithms for detecting BEC and phishing content in emails. The proposed models achieve an accuracy of 99.6%, 98%, 94.5%, 93.9%, 95%, and 97% in SVM, LSTM, RF, LR, ANN and NB, respectively.…”
Section: Citation Summary Of Contribution Limitationsmentioning
confidence: 99%
“…Some researchers presented a comparative study of various supervised and unsupervised ML techniques to provide an effective BEC phishing detection model that provides the highest accuracy, precision, recall, and F-measure to detect phishing emails. For example, Butt et al [8], Ripa, Islam, and Arifuzzaman [41], and Chakraborty and Mondal [11] created a comparative study using various ML algorithms, including DT, SVM, LSTM, RF, LR, ANN, NB, KR, and DT, to identify a ML algorithm that provides the highest accuracy on a specific dataset. Other researchers provided hybrid ML-based techniques that combine two or more algorithms with changes in variables to provide better accuracy for the BEC phishing detection model.…”
Section: Dewis Andmentioning
confidence: 99%
See 2 more Smart Citations