2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9375997
|View full text |Cite
|
Sign up to set email alerts
|

Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 32 publications
0
21
0
Order By: Relevance
“…Deep learning (DL): DL architecture is built based on neural networks that can discover hidden information in complex data through level-by-level learning [36]. The DL approach has become increasingly popular in the phishing detection domain with the recent development of DL technologies [2]. Although DL requires a more significant dataset and longer training time than the traditional ML method, it can automatically extract the features from raw data without prior knowledge [22].…”
Section: ) Classification By Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Deep learning (DL): DL architecture is built based on neural networks that can discover hidden information in complex data through level-by-level learning [36]. The DL approach has become increasingly popular in the phishing detection domain with the recent development of DL technologies [2]. Although DL requires a more significant dataset and longer training time than the traditional ML method, it can automatically extract the features from raw data without prior knowledge [22].…”
Section: ) Classification By Methodsmentioning
confidence: 99%
“…Taxonomy Current challenges Future directions Remark [1] Reviewed only conventional ML techniques Did not include DL approaches in the literature Did not discuss the existing issues or suggest the future research directions [4] Did not examine the most recent DL techniques for phishing detection Limited discussion on open challenges and future directions [5] Lacked an exhaustive analysis on DL-based phishing detection approach Did not discuss the current issues or future research directions [6] Did not investigate the most recent DL algorithms Did not discuss the open challenges or recommend future research directions [2] Lacked an extensive review on different types of phishing attacks and DL algorithms [3] Lacked an in-depth classification of phishing detection methods Emphasized more on traditional ML techniques [7] Focused only on the role and influences of features used for learning Did not analyze DL for phishing detection in detail Contained limited discussion on future research directions [8] Concentrated more on conventional ML approaches [9] Did not provide an in-depth analysis of DL for phishing detection [10] Lacked a discussion on DL classifier to detect phishing attacks…”
Section: Referencementioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Odeh et al presented in [28] a survey on recent protection techniques that were used to detect phishing attacks on websites. They are deep learning, automated techniques, heuristic, and machine learning-based techniques.…”
Section: Safae Et Al Inmentioning
confidence: 99%
“…As a result, researching and improving certified encryption algorithms is crucial in modern medicine [3]. Medical image encryption techniques attempt to convert a digital image to a different image data format that is difficult to recognize [4]- [7].…”
Section: Introductionmentioning
confidence: 99%