Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1177/1071181322661060
|View full text |Cite
|
Sign up to set email alerts
|

PhisherCop: Developing an NLP-Based Automated Tool for Phishing Detection

Abstract: Phishing poses a major security risk to organizations and individuals leading to loss of billions of dollars yearly. While risk communication serves as a tool to mitigate phishing attempts, it is imperative to create automated phishing detection tools. Numerous Natural Language Processing (NLP) approaches have been deployed to tackle phishing. However, phishing attempts continue to increase exponentially, which reiterates the need for more effective approach. To address this, we have developed an anti-phishing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 29 publications
(29 reference statements)
0
4
0
Order By: Relevance
“…On the other hand, in the active identification of infringing sites, twenty-one [25,[28][29][30][31][32][33][34][35][64][65][66][67][68][69][70][71][72][73][74][75] significant research contributions were compiled. Among these, three [65][66][67] engage in non-technical actions such as manual search and reporting, contributing to the legal takedown of offending sites.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, in the active identification of infringing sites, twenty-one [25,[28][29][30][31][32][33][34][35][64][65][66][67][68][69][70][71][72][73][74][75] significant research contributions were compiled. Among these, three [65][66][67] engage in non-technical actions such as manual search and reporting, contributing to the legal takedown of offending sites.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
“…Six projects [28,29,[68][69][70][71] follow a technical route, involving surveillance and cyber patrolling within the IoE. Regrettably, only twelve initiatives [28][29][30][31][32][33][34][35][72][73][74][75] implement one or more AI/ML techniques for identifying infringing content on the IoE, and of these, only eight [28][29][30][31][32][33][34][35] are considered closely related studies. Notably, a single article [25] stands out for its purely technical approach to the defensive and active aspects.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
See 2 more Smart Citations