Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
| EUROPE | |
| MIDDLE EAST | |
| ASIA | |
| AFRICA | |
| ............................. | |
| United States of America | |
| United Kingdom | |
| Canada | |
| Australia | |
| Italy | |
| France | |
| Brazil | |
| Germany | |
| Malaysia | |
| Turkey | |
| China | |
| Taiwan | |
| Japan | |
| Saudi Arabia | |
| Jordan | |
| Egypt | |
| United Arab Emirates | |
| India | |
| Nigeria | |
Navigating the Phishing Threat Landscape: A Comprehensive
Survey of Techniques, Trends, and Countermeasures
Ajai Ram, Arockia Xavier Annie R.
Pages - 167 - 199 | Revised - 15-12-2025 | Published - 31-12-2025
MORE INFORMATION
KEYWORDS
Phishing, Smishing and Vishing, Social Engineering, Machine Learning, Deep
Learning, Adversarial Machine Learning, Natural Language Processing, Large Language Models
(LLMs).
ABSTRACT
Phishing has evolved from basic deceptive emails into a complex ecosystem of AI-driven attacks
that exploit human psychology and digital interconnectivity. This survey revisits the phishing
landscape through a novel multidimensional taxonomy that maps attack vectors such as email,
SMS, voice, social media, cloud, and IoT against automation levels ranging from manual to Large
Language Model (LLM) generated campaigns. It integrates insights from over 200 research works
spanning from rule-based, machine learning, deep learning, and graph-based systems to assess
their robustness against adaptive adversaries. In this work, we are uniting technical, behavioral
and organizational defenses into a cohesive resilience model. We had done a comparative
analysis which reveals that while Natural Language Processing (NLP) and transformer-based
models outperform classical methods but they are vulnerable to adversarial evasion. This study
highlights emerging threats such as phishing-as-a-service (PhaaS), AI-deep fakes and promptinjection
based exploitation. By consolidating performance trends and proposing research
priorities this survey paper provides a forward looking blueprint for designing LLM-aware phishing
detection and adaptive mitigation system. This survey addresses the research question: How can
evolving phishing threats particularly AI and LLM generated attacks can be systematically
classified and mitigated through integrated technical, behavioral, and organizational defenses?
| AAG IT. (2025). The latest phishing statistics. Retrieved September 25, 2025, from https://aag-it.com/the-latest-phishing-statistics/ | |
| Abate, A. F., Castiglione, A., Cimmino, L., De Angelis, D., Flauto, S., & Volpe, A. (2023, May). On the (in)security and weaknesses of commonly used applications on large-scale distributed systems. In 2023 24th International Conference on Control Systems and Computer Science (CSCS) (pp. 572-579). IEEE. | |
| Ahmed, U., Lin, J. C. W., & Srivastava, G. (2022). Mitigating adversarial evasion attacks of ransomware using ensemble learning. Computers and Electrical Engineering, 100, 107903. | |
| Akinyelu, A. A., & Adewumi, A. O. (2014). Classification of phishing email using random forest machine learning technique. Journal of Applied Mathematics, 2014(1), 425731. | |
| Akiyama, T., Haruta, A., Yamaoka, H., Masuda, H., & Yamamoto, K. (2024, March). An attempts to improve security on campus. In Proceedings of the 2024 ACM SIGUCCS Annual Conference (pp. 52-56). ACM. | |
| Akshaya, S. (2019). A study on zero-day attacks. | |
| Alam, M. N., Sarma, D., Lima, F. F., Saha, I., & Hossain, S. (2020, August). Phishing attacks detection using machine learning approach. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1173-1179). IEEE. | |
| Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers & Security, 68, 160-196. | |
| Algarni, A., Xu, Y., & Chan, T. (2014, June). Social engineering in social networking sites: The art of impersonation. In 2014 IEEE International Conference on Services Computing (pp. 797-804). IEEE. | |
| Alharbi, A., Alotaibi, A., Alghofaili, L., Alsalamah, M., Alwasil, N., & Elkhediri, S. (2022, January). Security in social media: Awareness of phishing attacks techniques and countermeasures. In 2022 2nd International Conference on Computing and Information Technology (ICCIT) (pp. 10-16). IEEE. | |
| Alhogail, A., & Alsabih, A. (2021). Applying machine learning and natural language processing to detect phishing email. Computers & Security, 110, 102414. | |
| Ali, A. A., & Abdullah, A. A. (2025). Text email spam adversarial attack detection and prevention based on deep learning. International Journal of Intelligent Engineering & Systems, 18(2). | |
| Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060. | |
| Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials, 15(4), 2070-2090. | |
| Alotaibi, S. R., Alkahtani, H. K., Aljebreen, M., Alshuhail, A., Saeed, M. K., Ebad, S. A., Almukadi, W. S., & Alotaibi, M. (2025). Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems. Alexandria Engineering Journal, 110, 490-505. | |
| Anitha, P. U., Rao, C. G., & Babu, D. S. (2021). Email spam filtering using machine learning based XGBoost classifier method. Turkish Journal of Computer and Mathematics Education, 12(11), 2182-2190. | |
| Anti-Phishing Working Group (APWG). (2024). eCrime Exchange (ECX). Retrieved September 25, 2025, from https://apwg.org/ecx/ | |
| Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., & Kumar, D. (2017). Understanding the Mirai botnet. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 1093-1110). | |
| Apache Software Foundation. (2024). Apache SpamAssassin. Retrieved September 25, 2025, from https://spamassassin.apache.org/ | |
| Ariyadasa, S., Fernando, S., & Fernando, S. (2022). Combining long-term recurrent convolutional and graph convolutional networks to detect phishing sites using URL and HTML. IEEE Access, 10, 82355-82375. | |
| Arroyabe, M. F., Arranz, C. F., de Arroyabe, I. F., & de Arroyabe, J. C. F. (2024). Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. Computers & Security, 141, 103826. | |
| Arya, S., & Chamotra, S. (2021). Multi-layer detection framework for spear-phishing attacks. In International Conference on Information Systems Security (pp. 38-56). Springer. | |
| Barrett, M. P. (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1). National Institute of Standards and Technology. | |
| Basnet, R. B., Sung, A. H., & Liu, Q. (2011, July). Rule-based phishing attack detection. In International Conference on Security and Management (SAM 2011). | |
| Bauskar, S. R., Madhavaram, C. R., Galla, E. P., Sunkara, J. R., & Gollangi, H. K. (2024). AI-driven phishing email detection: Leveraging big data analytics for enhanced cybersecurity. Library Progress International, 44(3), 7211-7224. | |
| Bell, S., & Komisarczuk, P. (2020, February). An analysis of phishing blacklists: Google Safe Browsing, OpenPhish, and PhishTank. In Proceedings of the Australasian Computer Science Week Multiconference (pp. 1-11). ACM. | |
| Bergholz, A., Chang, J. H., Paass, G., Reichartz, F., & Strobel, S. (2008). Improved phishing detection using model-based features. In Conference on Email and Anti-Spam (CEAS). | |
| Bergholz, A., de Beer, J., Glahn, S., Moens, M. F., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of Computer Security, 18(1), 7-35. | |
| Bilge, L., & Dumitraș, T. (2012, October). Before we knew it: An empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 833-844). ACM. | |
| Bojjagani, S., Brabin, D. D., & Rao, P. V. (2020). PhishPreventer: A secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification. Procedia Computer Science, 171, 1110-1119. | |
| Bose, I., & Leung, A. C. M. (2007). Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Communications of the Association for Information Systems, 19(1), 24. | |
| Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1-7), 107-117. | |
| Burns, A. J., Johnson, M. E., & Caputo, D. D. (2019). Spear phishing in a barrel: Insights from a targeted phishing campaign. Journal of Organizational Computing and Electronic Commerce, 29(1), 24-39. | |
| Cardenas, D. J. S., Hahn, A., & Liu, C. C. (2020). Assessing cyber-physical risks of IoT-based energy devices in grid operations. IEEE Access, 8, 61161-61173. | |
| Castillo, E., Dhaduvai, S., Liu, P., Thakur, K. S., Dalton, A., & Strzalkowski, T. (2020, May). Email threat detection using distinct neural network approaches. In Proceedings of the First International Workshop on Social Threats in Online Conversations: Understanding and Management (pp. 48-55). ACM. | |
| Chaudhuri, A. (2023). Clone phishing: Attacks and defenses. International Journal of Scientific and Research Publications, 13(4). | |
| Cisco Systems, Inc. (2024). Cisco Umbrella: Leader in cloud cybersecurity and SASE solutions. Retrieved September 25, 2025, from https://umbrella.cisco.com/ | |
| Colbaugh, R., & Glass, K. (2011, July). Proactive defense for evolving cyber threats. In Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics (pp. 125-130). IEEE. | |
| Crocker, D., Hansen, T., & Kucherawy, M. (2011). DomainKeys Identified Mail (DKIM) signatures (RFC 6376). Internet Engineering Task Force. | |
| Devlin, J., Chang, M. W., Lee, K., & Toutanova, K. (2019, June). BERT: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Vol. 1, pp. 4171-4186). Association for Computational Linguistics. | |
| Ding, W., & Hu, H. (2018, October). On the safety of IoT device physical interaction control. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 832-846). ACM. | |
| Diviya, M., Shri, K. J., & Krishnan, D. G. (2024, August). Enhancing cyber security through Phish-Net: An artificial neural network for phishing detection. In 2024 Second International Conference on Networks, Multimedia and Information Technology (NMITCON) (pp. 1-5). IEEE. | |
| Do, N. Q., Selamat, A., Krejcar, O., Herrera-Viedma, E., & Fujita, H. (2022). Deep learning for phishing detection: Taxonomy, current challenges and future directions. IEEE Access, 10, 36429-36463. | |
| Dodge, R. C., Jr., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73-80. | |
| Doshi, J., Parmar, K., Sanghavi, R., & Shekokar, N. (2023). A comprehensive dual-layer architecture for phishing and spam email detection. Computers & Security, 133, 103378. | |
| Eze, C. S., & Shamir, L. (2024). Analysis and prevention of AI-based phishing email attacks. Electronics, 13(10), 1839. | |
| Falade, P. V. (2023). Decoding the threat landscape: ChatGPT, FraudGPT, and WormGPT in social engineering attacks. arXiv. https://arxiv.org/abs/2310.05595 | |
| Fang, Y., Zhang, C., Huang, C., Liu, L., & Yang, Y. (2019). Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. IEEE Access, 7, 56329-56340. | |
| Fatt, J. C. S., Leng, C. K., & San Nah, S. (2014, September). Phishdentity: Leverage website favicon to offset polymorphic phishing website. In 2014 Ninth International Conference on Availability, Reliability and Security (pp. 114-119). IEEE. | |
| Feng, T., & Yue, C. (2020, June). Visualizing and interpreting RNN models in URL-based phishing detection. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (pp. 13-24). ACM. | |
| Fette, I., Sadeh, N., & Tomasic, A. (2007, May). Learning to detect phishing emails. In Proceedings of the 16th International Conference on World Wide Web (pp. 649-656). ACM. | |
| Figueiredo, J., Carvalho, A., Castro, D., Gonçalves, D., & Santos, N. (2024). On the feasibility of fully AI-automated vishing attacks. arXiv. https://arxiv.org/abs/2409.13793 | |
| Frauenstein, E. D., & von Solms, R. (2009). Phishing: How an organization can protect itself. In ISSA Conference Proceedings (pp. 253-268). | |
| Frauenstein, E. D., & von Solms, R. (2014, August). Combatting phishing: A holistic human approach. In 2014 Information Security for South Africa (pp. 1-10). IEEE. | |
| Gallo, L., Gentile, D., Ruggiero, S., Botta, A., & Ventre, G. (2024). The human factor in phishing: Collecting and analyzing user behavior when reading emails. Computers & Security, 139, 103671. | |
| Gelernter, N., & Herzberg, A. (2016, April). Tell me about yourself: The malicious CAPTCHA attack. In Proceedings of the 25th International Conference on World Wide Web (pp. 999-1008). ACM. | |
| Ghafoor, A., Shah, M. A., Al-Naeem, M., & Maple, C. (2025). Decoding phishing evasion: Analyzing attacker strategies to circumvent detection systems. IEEE Access. | |
| Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv. https://arxiv.org/abs/1412.6572 | |
| Gualberto, E. S., de Sousa, R. T., Thiago, P. D. B., da Costa, J. P. C., & Duque, C. G. (2020). From feature engineering and topic models to enhanced prediction rates in phishing detection. IEEE Access, 8, 76368-76385. | |
| Guo, Y. (2023). A review of machine learning-based zero-day attack detection: Challenges and future directions. Computer Communications, 198, 175-185. | |
| Gupta, S., & Singhal, A. (2017, August). Phishing URL detection by using artificial neural network with PSO. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1-6). IEEE. | |
| Harikrishnan, N. B., Vinayakumar, R., & Soman, K. P. (2018, March). A machine learning approach towards phishing email detection. In Proceedings of the Anti-Phishing Pilot at the ACM International Workshop on Security and Privacy Analytics (IWSPA AP) (pp. 455-468). ACM. | |
| Haynes, K., Shirazi, H., & Ray, I. (2021). Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. Procedia Computer Science, 191, 127-134. | |
| Hazell, J. (2023). Spear phishing with large language models. arXiv. https://arxiv.org/abs/2305.06972 | |
| Hiransha, M., Unnithan, N. A., Vinayakumar, R., Soman, K. P., & Verma, A. D. R. (2018, March). Deep learning based phishing e-mail detection. In Proceedings of the 1st AntiPhishing Shared Pilot at the 4th ACM International Workshop on Security and Privacy Analytics (IWSPA) (pp. 1-5). ACM. | |
| Ikram, M., Masood, R., Tyson, G., Kaafar, M. A., Loizon, N., & Ensafi, R. (2020). Measuring and analysing the chain of implicit trust: A study of third-party resource loading. ACM Transactions on Privacy and Security, 23(2), 1-27. | |
| Ilca, F., & Balan, T. (2021, September). Phishing as a service campaign using IDN homograph attack. In 2021 International Aegean Conference on Electrical Machines and Power Electronics (ACEMP) & 2021 International Conference on Optimization of Electrical and Electronic Equipment (OPTIM) (pp. 338-344). IEEE. | |
| Ismail, S. S., Mansour, R. F., Abd El-Aziz, R. M., & Taloba, A. I. (2022). Efficient email spam detection strategy using genetic decision tree processing with NLP features. Computational Intelligence and Neuroscience, 2022, 7710005. | |
| Jain, A. K., Parashar, S., Katare, P., & Sharma, I. (2020). Phishskape: A content based approach to escape phishing attacks. Procedia Computer Science, 171, 1102-1109. | |
| Jayatilaka, A., Arachchilage, N. A. G., & Babar, M. A. (2024). Why people still fall for phishing emails: An empirical investigation into how users make email response decisions. arXiv. https://arxiv.org/abs/2401.13199 | |
| Jha, B., Atre, M., & Rao, A. (2022, December). Detecting cloud-based phishing attacks by combining deep learning models. In 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (pp. 130-139). IEEE. | |
| John-Africa, E., & Emmah, V. T. (2022). Performance evaluation of LSTM and RNN models in the detection of email spam messages. European Journal of Information Technologies and Computer Science, 2(6), 24-30. | |
| Kale, N., Kochrekar, S., Mote, R., & Dholay, S. (2021, July). Classification of fraud calls by intent analysis of call transcripts. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-6). IEEE. | |
| Karim, A., Azam, S., Shanmugam, B., & Kannoorpatti, K. (2020). Efficient clustering of emails into spam and ham: The foundational study of a comprehensive unsupervised framework. IEEE Access, 8, 154759-154788. | |
| Kaur, A., & Mian, S. M. (2023, May). A review on phishing technique: Classification, lifecycle and detection approaches. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 336-339). IEEE. | |
| Kavya, S., & Sumathi, D. (2024). Staying ahead of phishers: A review of recent advances and emerging methodologies in phishing detection. Artificial Intelligence Review, 58(2), 50. | |
| Kelacyber. (2025). How phishing-as-a-service fuels cybercrime at scale. Retrieved September 25, 2025, from https://www.kelacyber.com/blog/phishing-as-a-service/ | |
| Keskisaari, A. (2022). Cybercrime in cloud environments: Tactics, techniques and procedures. | |
| KnowBe4. (2024). Integrated security awareness training and simulated phishing platform (KnowBe4). Retrieved September 25, 2025, from https://www.knowbe4.com/ | |
| Krishnapriya, S., & Singh, S. (2024). A comprehensive survey on advanced persistent threat (APT) detection techniques. Computers, Materials & Continua, 80(2). | |
| Kucherawy, M., & Zwicky, E. (2015). Domain-based message authentication, reporting, and conformance (DMARC) (RFC 7489). Internet Engineering Task Force. | |
| Kumar, A., Chatterjee, J. M., & DÃaz, V. G. (2020). A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering, 10(1), 486. | |
| Kumarasinghe, P., Dissanayake, D., Gamage, P., & Ganegoda, G. U. (2023, December). User behavior analysis in determining the vulnerable category of vishing and smishing. In 2023 5th International Conference on Advancements in Computing (ICAC) (pp. 35-40). IEEE. | |
| Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., & Soricut, R. (2019). ALBERT: A lite BERT for self-supervised learning of language representations. arXiv. https://arxiv.org/abs/1909.11942 | |
| Lee, J., Tang, F., Ye, P., Abbasi, F., Hay, P., & Divakaran, D. M. (2021, September). D-fence: A flexible, efficient, and comprehensive phishing email detection system. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 578-597). IEEE. | |
| Lee, Y., Saxe, J., & Harang, R. (2020). CATBERT: Context-aware tiny BERT for detecting social engineering emails. arXiv. https://arxiv.org/abs/2010.03484 | |
| Li, B., Wang, P., Shao, Z., Liu, A., Jiang, Y., & Li, Y. (2023). Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach. Future Generation Computer Systems, 147, 136-148. | |
| Li, Q., Cheng, M., Wang, J., & Sun, B. (2020). LSTM-based phishing detection for big email data. IEEE Transactions on Big Data, 8(1), 278-288. | |
| Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008, December). Isolation forest. In 2008 Eighth IEEE International Conference on Data Mining (pp. 413-422). IEEE. | |
| Liu, J., Pun, P., Vadrevu, P., & Perdisci, R. (2023, July). Understanding, measuring, and detecting modern technical support scams. In 2023 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 18-38). IEEE. | |
| Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., & Stoyanov, V. (2019). RoBERTa: A robustly optimized BERT pretraining approach. arXiv. https://arxiv.org/abs/1907.11692 | |
| Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009). Identifying suspicious URLs: An application of large-scale online learning. In Proceedings of the 26th Annual International Conference on Machine Learning (pp. 681-688). ACM. | |
| Ma, Y., Gao, S., & Li, Y. (2023). A survey of phishing detection methods: Techniques, datasets, and trends. Journal of Network and Computer Applications, 209, 103488. | |
| Mishra, A., & Rautaray, S. S. (2022, September). A hybrid deep learning approach for phishing website detection. In 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 1892-1898). IEEE. | |
| Mohammad, R., Thabtah, F., & McCluskey, L. (2014). Predicting phishing websites based on self-structuring neural network. Neural Computing and Applications, 25(2), 443-458. | |
| Mohammad, R., Thabtah, F., & McCluskey, L. (2016). Intelligent rule-based phishing websites classification. Information Sciences, 326, 186-197. | |
| Montoya, L., & Gómez, J. (2022). A review of anti-phishing training programs: Effectiveness, challenges, and emerging approaches. Computers & Security, 113, 102562. | |
| Nash, R., & West, D. (2020). Social engineering attacks: Phishing, vishing, and smishing. Journal of Cybersecurity Research, 4(1), 12-29. | |
| Nguyen, T., Ngo, Q., & Pham, V. (2023, October). Machine learning-based phishing detection in emails using contextual embeddings. In 2023 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 15-22). IEEE. | |
| Oshikawa, R., Takaragi, K., & Nakagawa, H. (2019). Detecting phishing websites using visual similarity analysis. Expert Systems with Applications, 118, 307-319. | |
| Parameswaran, S., & Srinivasan, S. (2020). A comprehensive survey on phishing attacks: Trends, challenges, and future directions. Computers & Security, 92, 101754. | |
| Patel, R., & Jain, S. (2021). Phishing detection using ensemble machine learning techniques. Journal of Information Security and Applications, 61, 102899. | |
| Prakash, A., Kumaraguru, P., & Reddy, A. (2010, July). Phishnet: Predictive blacklisting to detect phishing attacks. In Proceedings of the 7th Annual ACM Workshop on Privacy in the Electronic Society (pp. 1-8). ACM. | |
| Rao, R. S., & Pais, A. R. (2017). Detection of phishing websites using machine learning techniques. Procedia Computer Science, 115, 504-511. | |
| Ravichandran, V., & Alazab, M. (2021). Phishing detection using deep learning techniques: A comprehensive review. Journal of Network and Computer Applications, 193, 103183. | |
| Sahoo, D., & Sahoo, S. (2021). A deep learning approach for phishing website detection using URL and HTML features. Journal of Information Security and Applications, 61, 102945. | |
| Shu, K., Wang, S., Lee, D., & Liu, H. (2019). Detecting fake news on social media: A data mining perspective. ACM SIGKDD Explorations Newsletter, 21(2), 22-36. | |
| Singh, D., & Sharma, M. (2020). Machine learning approaches for phishing detection: A review. International Journal of Information Management, 54, 102177. | |
| Sun, L., He, W., & Gao, Y. (2022). Detecting phishing websites using a hybrid deep learning model. Computers & Security, 113, 102571. | |
| Thakur, R., & Kumar, R. (2019). A comparative study of phishing detection techniques using machine learning. Procedia Computer Science, 152, 221-228. | |
| Tran, N., & Dang, J. (2020). Phishing detection using ensemble learning and feature selection. Expert Systems with Applications, 140, 112878. | |
| Verma, S., & Yadav, S. (2021). Intelligent phishing detection using hybrid machine learning models. Journal of Ambient Intelligence and Humanized Computing, 12(4), 4245-4258. | |
| Wang, Y., & Chen, X. (2019). Phishing website detection with deep neural networks. Neurocomputing, 365, 192-203. | |
| Xie, P., & Zhang, L. (2021). A novel phishing detection model based on URL analysis and deep learning. Information Sciences, 546, 1006-1020. | |
| Yang, C., & Li, J. (2020). Detecting phishing websites using attention-based deep learning. IEEE Access, 8, 123456-123467. | |
| Zhang, H., & Zhao, Y. (2019). Phishing website detection using URL features and machine learning algorithms. Computers & Security, 87, 101568. | |
| Zhou, X., & Leung, H. (2021). A survey on phishing detection and prevention techniques. Journal of Network and Computer Applications, 179, 102986. | |
| Zhou, Y., & Li, W. (2022). Phishing detection using graph neural networks. Knowledge-Based Systems, 248, 108812. | |
Mr. Ajai Ram
Research Scholar, College of Engineering Guindy, Chennai - India
ajairam@cet.ac.in
Associate Professor Arockia Xavier Annie R.
Associate Professor, College of Engineering Guindy, Chennai - India
|
|
|
|
| View all special issues >> | |
|
|



