Proceedings of the ACMSE 2018 Conference 2018
DOI: 10.1145/3190645.3190719
|View full text |Cite
|
Sign up to set email alerts
|

Phishing e-mail detection by using deep learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…There are many pieces of research aimed to develop applications that can correctly detect phishing cases [3]- [6]. Some of them focus on the phishing sites detection [7]- [10], whereas other part focus on the phishing e-mails detection [11]- [13]. This paper is concentrated on phishing e-mail detection.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many pieces of research aimed to develop applications that can correctly detect phishing cases [3]- [6]. Some of them focus on the phishing sites detection [7]- [10], whereas other part focus on the phishing e-mails detection [11]- [13]. This paper is concentrated on phishing e-mail detection.…”
Section: Introductionmentioning
confidence: 99%
“…Instead of selecting more representative features, or performing mathematical transformations or probabilistic calculations on the VSM representation to extract more distinctive features, representing such texts in a fixed shared low dimensional space, also called distributed models [13], [24]- [26], is also an approach. In this paradigm, a vector and its pre-fixed dimensions represent a word and its contextual information (such as relations with other words, and its semantic and syntactic similarities).…”
Section: Introductionmentioning
confidence: 99%
“…At this stage, from the features attributes provided by the feature engineering phase, models are trained to properly fit the e-mail characteristics, achieving a discriminating function to classify 13 these e-mails instances as legitimate or phishing e-mail. The obtained features sets are derived from two methods, Method 1 and Method 2, each with two perspectives (using a different technique in each of them), as stated earlier.…”
Section: J Features Attributesmentioning
confidence: 99%
“…Therefore, the detection of this type of e-mail is critical to counter these attacks. Currently, as pointed in [8], [9], [10] and [7], phishing detecting mechanisms based on Natural Language Processing (NLP) and Machine Learning (ML) techniques, such as [11], [12] and [13], are an effective way to defend against this type of threat, since such approaches exploit the morphology and semantics of the text.…”
Section: Introductionmentioning
confidence: 99%
“…Hassanpour et al [46] displayed the email material as highlights in the Word2-Vec format utilizing certain deep learning tools, and developers have achieved 97 percent of general accuracy.…”
Section: Literature Surveymentioning
confidence: 99%