A comprehensive survey of AI-enabled phishing attacks detection techniques

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telecommunication systems Jg. 76; H. 1; S. 139 - 154
Hauptverfasser: Basit, Abdul, Zafar, Maham, Liu, Xuan, Javed, Abdul Rehman, Jalil, Zunera, Kifayat, Kashif
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York Springer US 01.01.2021
Springer Nature B.V
Schlagworte:
ISSN:1018-4864, 1572-9451
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
AbstractList In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.
Author Liu, Xuan
Jalil, Zunera
Kifayat, Kashif
Javed, Abdul Rehman
Basit, Abdul
Zafar, Maham
Author_xml – sequence: 1
  givenname: Abdul
  surname: Basit
  fullname: Basit, Abdul
  organization: Department of Computer Science, Air University
– sequence: 2
  givenname: Maham
  surname: Zafar
  fullname: Zafar, Maham
  organization: Department of Computer Science, Air University
– sequence: 3
  givenname: Xuan
  orcidid: 0000-0002-7966-4488
  surname: Liu
  fullname: Liu, Xuan
  email: yusuf@yzu.edu.cn
  organization: School of Information Engineering, Yangzhou University
– sequence: 4
  givenname: Abdul Rehman
  surname: Javed
  fullname: Javed, Abdul Rehman
  organization: Department of Cyber Security, Air University
– sequence: 5
  givenname: Zunera
  surname: Jalil
  fullname: Jalil, Zunera
  organization: Department of Cyber Security, Air University
– sequence: 6
  givenname: Kashif
  surname: Kifayat
  fullname: Kifayat, Kashif
  organization: Department of Cyber Security, Air University
BookMark eNp9kU1v1DAQhi1URD_gD3CKxIWLweOPOHtBWlV8FFXiAmfLccYbl6y92MlK_fc4bBGih57G1jzvzLwzl-QspoiEvAb2DhjT7wsAF4oyzmj9CkH5M3IBSnO6kQrO6ptBR2XXynNyWcodY6ts84KcCwHAhGQX5Ou2cWl_yDhiLOGITVnyEe-b5JvtDcVo-wmH5jCGMoa4a-w8W_ezNAPO6OaQYlPjGMOvBctL8tzbqeCrh3hFfnz6-P36C7399vnmentLnQI904E7LdtBD8B758Bbr1qQ4LkHtL2VXoqNgxo7XXk5AMrO9syxFhXzAxdX5MOp7mHp9zg4jHO2kznksLf53iQbzP-ZGEazS0ejVQeKiVrg7UOBnNbBZ7MPxeE02YhpKYZLVTsLpllF3zxC79KSY7VXKb3hXHSyrVR3olxOpWT0xoXZruup_cNkgJl18-Z0MFMPZv4czKxm-CPpXx9PisRJVCocd5j_TfWE6jeraamc
CitedBy_id crossref_primary_10_1002_spy2_402
crossref_primary_10_1051_itmconf_20257802010
crossref_primary_10_3390_app132413269
crossref_primary_10_38124_ijisrt_25jul1306
crossref_primary_10_1109_ACCESS_2023_3346045
crossref_primary_10_1007_s00779_024_01794_9
crossref_primary_10_1109_ACCESS_2022_3204171
crossref_primary_10_1155_2022_5036026
crossref_primary_10_1109_TBDATA_2022_3227336
crossref_primary_10_3389_fpubh_2021_788347
crossref_primary_10_3390_fi14030082
crossref_primary_10_3390_technologies11060161
crossref_primary_10_1016_j_jik_2025_100762
crossref_primary_10_62762_TSCC_2024_322898
crossref_primary_10_1016_j_csa_2024_100036
crossref_primary_10_3389_fcomp_2024_1428013
crossref_primary_10_1016_j_eswa_2022_118010
crossref_primary_10_1007_s13399_024_05887_6
crossref_primary_10_1109_ACCESS_2023_3237798
crossref_primary_10_3389_frcmn_2025_1587654
crossref_primary_10_1007_s10586_024_04313_w
crossref_primary_10_3390_s24072077
crossref_primary_10_1109_ACCESS_2022_3174554
crossref_primary_10_3390_electronics11010016
crossref_primary_10_3390_s24051672
crossref_primary_10_1109_OJCOMS_2024_3462503
crossref_primary_10_4271_12_07_03_0020
crossref_primary_10_58564_IJSER_3_1_2024_146
crossref_primary_10_1007_s42979_022_01292_w
crossref_primary_10_3390_make3030034
crossref_primary_10_1016_j_jksuci_2023_01_004
crossref_primary_10_1016_j_cose_2024_103885
crossref_primary_10_36962_PAHTEI30072023_59
crossref_primary_10_1007_s10462_024_10973_2
crossref_primary_10_1109_JIOT_2023_3247594
crossref_primary_10_1109_ACCESS_2024_3375882
crossref_primary_10_3390_su14084829
crossref_primary_10_1109_ACCESS_2025_3555157
crossref_primary_10_1155_2021_6632747
crossref_primary_10_1177_18724981251337385
crossref_primary_10_3390_electronics13183677
crossref_primary_10_1016_j_eswa_2022_117553
crossref_primary_10_1109_ACCESS_2021_3135870
crossref_primary_10_3390_fi16030086
crossref_primary_10_1007_s10207_025_01095_z
crossref_primary_10_17694_bajece_1490596
crossref_primary_10_1177_1088467X251341783
crossref_primary_10_1155_2022_7402085
crossref_primary_10_1109_ACCESS_2024_3486462
crossref_primary_10_3390_electronics12010232
crossref_primary_10_1109_ACCESS_2022_3151903
crossref_primary_10_3390_app13084649
crossref_primary_10_1002_ett_4872
crossref_primary_10_3390_app12188972
crossref_primary_10_1016_j_procs_2023_01_268
crossref_primary_10_3390_telecom4020017
crossref_primary_10_1109_ACCESS_2021_3109091
crossref_primary_10_1016_j_cose_2024_104188
crossref_primary_10_5604_01_3001_0053_7217
crossref_primary_10_1007_s43681_024_00427_4
crossref_primary_10_1007_s00521_021_06401_z
crossref_primary_10_1016_j_ins_2023_02_039
crossref_primary_10_1007_s11760_024_03204_2
crossref_primary_10_1155_2021_5561816
crossref_primary_10_1093_comjnl_bxaf036
crossref_primary_10_1007_s10462_025_11338_z
crossref_primary_10_1007_s10115_022_01672_x
crossref_primary_10_1109_ACCESS_2025_3528114
crossref_primary_10_1007_s11227_021_04250_0
crossref_primary_10_1007_s11277_022_09781_0
crossref_primary_10_1007_s10462_025_11141_w
crossref_primary_10_1016_j_eswa_2023_122199
crossref_primary_10_1016_j_procs_2025_04_003
crossref_primary_10_1007_s42979_022_01069_1
crossref_primary_10_1007_s10922_021_09587_8
crossref_primary_10_1109_ACCESS_2023_3293063
crossref_primary_10_3390_electronics12061333
crossref_primary_10_1016_j_cose_2024_103780
crossref_primary_10_1016_j_jisa_2022_103169
crossref_primary_10_1016_j_asoc_2024_112540
crossref_primary_10_1109_TDSC_2023_3234561
crossref_primary_10_1080_19361610_2025_2508726
crossref_primary_10_1016_j_comnet_2025_111375
crossref_primary_10_1080_23742917_2023_2240606
crossref_primary_10_3233_IDT_220307
crossref_primary_10_1007_s10586_024_04272_2
crossref_primary_10_1051_bioconf_20249700059
crossref_primary_10_3390_s23167207
crossref_primary_10_1007_s10462_024_10893_1
crossref_primary_10_3390_s22052017
crossref_primary_10_1177_21695067231192215
crossref_primary_10_1080_0144929X_2023_2230305
crossref_primary_10_1016_j_aej_2025_02_069
crossref_primary_10_1007_s11235_022_00979_y
crossref_primary_10_1109_COMST_2024_3382470
crossref_primary_10_1109_ACCESS_2024_3352897
crossref_primary_10_1007_s00521_023_08818_0
crossref_primary_10_1016_j_infsof_2025_107877
crossref_primary_10_1016_j_heliyon_2023_e22947
crossref_primary_10_1051_itmconf_20224701009
crossref_primary_10_1016_j_matpr_2021_07_178
crossref_primary_10_1007_s11277_021_08196_7
crossref_primary_10_1007_s10207_023_00768_x
crossref_primary_10_1016_j_jbusres_2023_113987
crossref_primary_10_1007_s11235_021_00799_6
crossref_primary_10_1007_s10586_025_05373_2
crossref_primary_10_1109_ACCESS_2024_3390093
crossref_primary_10_1007_s00779_021_01607_3
crossref_primary_10_1007_s11063_025_11777_3
crossref_primary_10_1007_s00521_021_06305_y
crossref_primary_10_3390_math11143217
crossref_primary_10_1002_cpe_7601
crossref_primary_10_1109_ACCESS_2025_3561237
crossref_primary_10_32604_cmc_2023_036422
crossref_primary_10_1109_JPROC_2024_3379855
crossref_primary_10_1109_ACCESS_2022_3142508
crossref_primary_10_1080_10406026_2025_2478045
crossref_primary_10_1109_COMST_2024_3441752
crossref_primary_10_1007_s10462_024_10908_x
crossref_primary_10_4102_sajim_v26i1_1763
crossref_primary_10_1007_s11277_023_10736_2
crossref_primary_10_1155_2022_1699657
crossref_primary_10_1155_2022_2975033
crossref_primary_10_1109_ACCESS_2024_3521945
crossref_primary_10_1080_10889868_2024_2439829
crossref_primary_10_1109_ACCESS_2024_3436812
crossref_primary_10_2478_raft_2025_0028
crossref_primary_10_1080_0952813X_2022_2093409
crossref_primary_10_1109_ACCESS_2024_3403197
crossref_primary_10_3390_s21144816
crossref_primary_10_1007_s11235_021_00850_6
crossref_primary_10_1016_j_chb_2025_108734
crossref_primary_10_1109_ACCESS_2023_3247135
Cites_doi 10.1016/j.ijhcs.2019.02.007
10.1016/j.ijhcs.2018.06.004
10.1109/ICECTA.2017.8252051
10.1016/j.cose.2017.04.006
10.1109/BDCloud.2018.00045
10.1002/ett.3997
10.1186/s13638-019-1361-0
10.1109/ICGEC.2011.25
10.3233/JCS-181253
10.1109/ACCESS.2020.3013699
10.1007/978-3-030-00557-3_46
10.1080/09720510.2020.1799496
10.1109/ACCESS.2020.3003569
10.1016/j.jisa.2019.102419
10.1007/978-3-030-16660-1_12
10.1109/ICICCT.2018.8473085
10.1109/ACCESS.2020.2988160
10.1016/j.procs.2018.03.053
10.1016/j.eswa.2018.07.067
10.1109/ICCC.2013.6731669
10.1109/HICSS.2014.254
10.1016/j.cose.2018.01.015
10.1109/SURV.2013.032213.00009
10.2139/ssrn.3418542
10.1145/3227609.3227655
10.1016/j.procs.2020.02.251
10.1007/978-3-030-24318-0_68
10.1016/j.eswa.2018.03.050
10.1016/j.procs.2018.05.103
10.11591/ijece.v10i1.pp486-493
10.1109/SPIN.2018.8474040
10.1007/s11235-017-0334-z
10.1109/ACCESS.2020.2969780
10.1002/spy2.73
10.1016/j.procs.2020.04.118
10.1016/j.cose.2017.02.004
10.1587/transinf.2018NTI0001
10.1016/j.chb.2018.05.037
10.1007/s00521-016-2275-y
10.1108/EL-05-2019-0118
10.1016/j.eswa.2018.09.029
10.1109/ISI.2017.8004877
10.1007/978-981-13-9155-2_5
10.1016/j.future.2018.11.004
10.1007/978-981-13-1708-8_37
10.14569/IJACSA.2019.0100133
10.1016/j.ins.2019.01.064
10.1016/j.cose.2019.02.004
10.1007/s11235-017-0414-0
10.1109/ICCUBEA.2018.8697412
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Copyright Springer Nature B.V. Jan 2021
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Copyright Springer Nature B.V. Jan 2021
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
3V.
7SC
7SP
7WY
7WZ
7XB
87Z
88I
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
L.-
L7M
L~C
L~D
M0C
M2P
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
7X8
5PM
DOI 10.1007/s11235-020-00733-2
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Science Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
MEDLINE - Academic
PubMed Central (Full Participant titles)
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Science Journals (Alumni Edition)
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic

ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1572-9451
EndPage 154
ExternalDocumentID PMC7581503
10_1007_s11235_020_00733_2
GroupedDBID -Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29Q
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
88I
8FE
8FG
8FL
8FW
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACGOD
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADHKG
ADIMF
ADKFA
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFDZB
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGQPQ
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHPBZ
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYFIA
AYQZM
AZFZN
AZQEC
B-.
BA0
BAPOH
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
GQ8
GROUPED_ABI_INFORM_RESEARCH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6~
KDC
KOV
KOW
LAK
LLZTM
M0C
M2P
M4Y
MA-
MK~
ML~
MS~
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
OAM
OVD
P19
P2P
P62
P9O
PF0
PHGZT
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZC
RZD
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SBE
SCF
SCLPG
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZMTXR
ZYFGU
~A9
~EX
AAYXX
ABFSG
ABRTQ
ACSTC
AEZWR
AFFHD
AFHIU
AFOHR
AHWEU
AIXLP
ATHPR
CITATION
PHGZM
PQGLB
3V.
7SC
7SP
7XB
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
7X8
5PM
ID FETCH-LOGICAL-c517t-d2c746d7d12bcc1faf56141f2f1eaba4f439c1a4f875174d1e48ab0c06e50fd23
IEDL.DBID P5Z
ISICitedReferencesCount 172
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000583470800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1018-4864
IngestDate Tue Nov 04 01:52:34 EST 2025
Thu Nov 20 07:13:50 EST 2025
Tue Nov 04 22:28:22 EST 2025
Sat Nov 29 08:04:36 EST 2025
Tue Nov 18 21:55:06 EST 2025
Wed Apr 09 21:54:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Deep learning
Advanced phishing techniques
Internet security
Machine learning
Security threats
Phishing attack
Hybrid learning
Cyberattack
Language English
License This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c517t-d2c746d7d12bcc1faf56141f2f1eaba4f439c1a4f875174d1e48ab0c06e50fd23
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Review-3
content type line 23
ORCID 0000-0002-7966-4488
OpenAccessLink https://pubmed.ncbi.nlm.nih.gov/PMC7581503
PMID 33110340
PQID 2479223846
PQPubID 45633
PageCount 16
ParticipantIDs pubmedcentral_primary_oai_pubmedcentral_nih_gov_7581503
proquest_miscellaneous_2455173070
proquest_journals_2479223846
crossref_citationtrail_10_1007_s11235_020_00733_2
crossref_primary_10_1007_s11235_020_00733_2
springer_journals_10_1007_s11235_020_00733_2
PublicationCentury 2000
PublicationDate 2021-01-01
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle Modelling, Analysis, Design and Management
PublicationTitle Telecommunication systems
PublicationTitleAbbrev Telecommun Syst
PublicationYear 2021
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References R Fatima (733_CR23) 2019; 27
KL Chiew (733_CR18) 2018; 106
K Parsons (733_CR52) 2019; 128
M Volkamer (733_CR60) 2017; 71
733_CR50
733_CR51
733_CR53
C Iwendi (733_CR32) 2020; 8
733_CR55
OK Sahingoz (733_CR54) 2019; 117
733_CR57
733_CR14
733_CR58
733_CR15
MA Adebowale (733_CR10) 2019; 115
AK Jain (733_CR35) 2020; 171
A Yasin (733_CR64) 2019; 2
MA Ferrag (733_CR25) 2020; 50
J Mao (733_CR44) 2018; 129
733_CR7
A Kumar (733_CR41) 2020; 10
733_CR8
733_CR46
733_CR9
733_CR47
A Aleroud (733_CR11) 2017; 68
733_CR48
733_CR49
BB Gupta (733_CR27) 2017; 28
SW Liew (733_CR43) 2019; 83
BB Gupta (733_CR28) 2018; 67
733_CR1
EJ Williams (733_CR62) 2018; 120
733_CR2
733_CR3
733_CR4
733_CR5
H Hota (733_CR29) 2018; 132
733_CR6
J Mao (733_CR45) 2019; 2019
SR Curtis (733_CR21) 2018; 87
733_CR30
S Jagadeesan (733_CR33) 2018; 118
YA Alsariera (733_CR13) 2020; 8
KL Chiew (733_CR19) 2019; 484
733_CR31
733_CR36
733_CR37
733_CR38
733_CR39
AA Ubing (733_CR59) 2019; 10
W Ali (733_CR12) 2020; 8
M Khonji (733_CR40) 2013; 15
A Subasi (733_CR56) 2020; 168
733_CR61
K Cabaj (733_CR16) 2018; 75
AK Jain (733_CR34) 2018; 68
733_CR63
733_CR20
YH Chen (733_CR17) 2019; 102
A El Aassal (733_CR22) 2020; 8
733_CR65
Y Li (733_CR42) 2019; 94
733_CR24
733_CR26
References_xml – volume: 128
  start-page: 17
  year: 2019
  ident: 733_CR52
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2019.02.007
– volume: 120
  start-page: 1
  year: 2018
  ident: 733_CR62
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2018.06.004
– ident: 733_CR37
– ident: 733_CR57
  doi: 10.1109/ICECTA.2017.8252051
– volume: 68
  start-page: 160
  year: 2017
  ident: 733_CR11
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.04.006
– ident: 733_CR63
  doi: 10.1109/BDCloud.2018.00045
– ident: 733_CR47
  doi: 10.1002/ett.3997
– volume: 2019
  start-page: 43
  issue: 1
  year: 2019
  ident: 733_CR45
  publication-title: EURASIP Journal on Wireless Communications and Networking
  doi: 10.1186/s13638-019-1361-0
– ident: 733_CR4
– ident: 733_CR24
  doi: 10.1109/ICGEC.2011.25
– volume: 27
  start-page: 581
  issue: 6
  year: 2019
  ident: 733_CR23
  publication-title: Journal of Computer Security
  doi: 10.3233/JCS-181253
– ident: 733_CR8
– volume: 8
  start-page: 142532
  year: 2020
  ident: 733_CR13
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3013699
– ident: 733_CR31
  doi: 10.1007/978-3-030-00557-3_46
– ident: 733_CR46
  doi: 10.1080/09720510.2020.1799496
– volume: 118
  start-page: 4159
  issue: 20
  year: 2018
  ident: 733_CR33
  publication-title: International Journal of Pure and Applied Mathematics
– volume: 8
  start-page: 116766
  year: 2020
  ident: 733_CR12
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3003569
– volume: 50
  start-page: 102419
  year: 2020
  ident: 733_CR25
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2019.102419
– ident: 733_CR50
  doi: 10.1007/978-3-030-16660-1_12
– ident: 733_CR51
  doi: 10.1109/ICICCT.2018.8473085
– volume: 8
  start-page: 72650
  year: 2020
  ident: 733_CR32
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2988160
– volume: 129
  start-page: 224
  year: 2018
  ident: 733_CR44
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2018.03.053
– volume: 115
  start-page: 300
  year: 2019
  ident: 733_CR10
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2018.07.067
– ident: 733_CR36
  doi: 10.1109/ICCC.2013.6731669
– ident: 733_CR3
– ident: 733_CR20
  doi: 10.1109/HICSS.2014.254
– volume: 75
  start-page: 24
  year: 2018
  ident: 733_CR16
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2018.01.015
– ident: 733_CR7
– ident: 733_CR26
– volume: 15
  start-page: 2091
  issue: 4
  year: 2013
  ident: 733_CR40
  publication-title: IEEE Communications Surveys and Tutorials
  doi: 10.1109/SURV.2013.032213.00009
– ident: 733_CR39
  doi: 10.2139/ssrn.3418542
– ident: 733_CR61
  doi: 10.1145/3227609.3227655
– volume: 168
  start-page: 272
  year: 2020
  ident: 733_CR56
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2020.02.251
– ident: 733_CR14
  doi: 10.1007/978-3-030-24318-0_68
– volume: 106
  start-page: 1
  year: 2018
  ident: 733_CR18
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2018.03.050
– volume: 132
  start-page: 900
  year: 2018
  ident: 733_CR29
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2018.05.103
– volume: 10
  start-page: 486
  issue: 1
  year: 2020
  ident: 733_CR41
  publication-title: International Journal of Electrical and Computer Engineering
  doi: 10.11591/ijece.v10i1.pp486-493
– ident: 733_CR58
  doi: 10.1109/SPIN.2018.8474040
– ident: 733_CR2
– volume: 67
  start-page: 247
  issue: 2
  year: 2018
  ident: 733_CR28
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-017-0334-z
– volume: 8
  start-page: 22170
  year: 2020
  ident: 733_CR22
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2969780
– ident: 733_CR6
– volume: 2
  start-page: e73
  issue: 4
  year: 2019
  ident: 733_CR64
  publication-title: Security and Privacy
  doi: 10.1002/spy2.73
– volume: 171
  start-page: 1102
  year: 2020
  ident: 733_CR35
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2020.04.118
– volume: 71
  start-page: 100
  year: 2017
  ident: 733_CR60
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.02.004
– volume: 102
  start-page: 878
  issue: 5
  year: 2019
  ident: 733_CR17
  publication-title: IEICE Transactions on Information and Systems
  doi: 10.1587/transinf.2018NTI0001
– volume: 87
  start-page: 174
  year: 2018
  ident: 733_CR21
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2018.05.037
– volume: 28
  start-page: 3629
  issue: 12
  year: 2017
  ident: 733_CR27
  publication-title: Neural Computing and Applications
  doi: 10.1007/s00521-016-2275-y
– ident: 733_CR55
– ident: 733_CR38
– ident: 733_CR65
  doi: 10.1108/EL-05-2019-0118
– volume: 117
  start-page: 345
  year: 2019
  ident: 733_CR54
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2018.09.029
– ident: 733_CR9
  doi: 10.1109/ISI.2017.8004877
– ident: 733_CR30
– ident: 733_CR15
  doi: 10.1007/978-981-13-9155-2_5
– volume: 94
  start-page: 27
  year: 2019
  ident: 733_CR42
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2018.11.004
– ident: 733_CR48
  doi: 10.1007/978-981-13-1708-8_37
– ident: 733_CR1
– volume: 10
  start-page: 252
  issue: 1
  year: 2019
  ident: 733_CR59
  publication-title: International Journal of Advanced Computer Science and Applications
  doi: 10.14569/IJACSA.2019.0100133
– volume: 484
  start-page: 153
  year: 2019
  ident: 733_CR19
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2019.01.064
– volume: 83
  start-page: 201
  year: 2019
  ident: 733_CR43
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2019.02.004
– volume: 68
  start-page: 687
  issue: 4
  year: 2018
  ident: 733_CR34
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-017-0414-0
– ident: 733_CR49
– ident: 733_CR53
  doi: 10.1109/ICCUBEA.2018.8697412
– ident: 733_CR5
SSID ssj0010079
Score 2.6105626
SecondaryResourceType review_article
Snippet In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a...
SourceID pubmedcentral
proquest
crossref
springer
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 139
SubjectTerms Access control
Artificial Intelligence
Business and Management
Computer Communication Networks
Copying
Cybercrime
IT in Business
Literature reviews
Machine learning
Phishing
Probability Theory and Stochastic Processes
Social networks
Telecommunications systems
Websites
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED9EfdAHv8XqlAi-aaBJs7Z7HOJQkSF-sbfSJikbSDfWbuB_7yVrOzdU0Kc-JG3KJbn8Lnf3O4ALprn049CjvpsIKjRvGj2oaMyZDL1QoQ1teWYfgm437PVaj2VSWF5Fu1cuSaup58luJq2TGnPHVhqkqHjX8LgLzXZ8en6rfQfY2rI-TmauynxRpsp8_43F42iOMZcjJJfcpPb06Wz_7793YKtEm6Q9Wx67sKKzPdj8wkG4D_dtYsLKx7o_C2Un-WQ81R9kmJL2HdU2tUqRUX92V0XiojBZ-UTpwgZxZaRmgc0P4LVz83J9S8sCC1Q2WVBQxWUgfBUoxhMpWRqnhheUpTxlOk5ikSJakQyfaNSg5aKYFmGcuNL1ddNNFfcOYTUbZvoICJcqMXWMEe9poZI0lK5yVaikSBBDyZYDrJJzJEv2cVME4z2a8yYbOUUop8jKKeIOXNbvjGbcG7_2blTTF5X7MI-4CFoIgBBkOXBeN-MOMm6RONPDiemDqDEwus-BYGHa61ENB_diSzboWy5uNLcQUnsOXFWTPx_85389_lv3E9jgJpTG3vw0YLUYT_QprMtpMcjHZ3b1fwKyJP8o
  priority: 102
  providerName: Springer Nature
Title A comprehensive survey of AI-enabled phishing attacks detection techniques
URI https://link.springer.com/article/10.1007/s11235-020-00733-2
https://www.proquest.com/docview/2479223846
https://www.proquest.com/docview/2455173070
https://pubmed.ncbi.nlm.nih.gov/PMC7581503
Volume 76
WOSCitedRecordID wos000583470800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1572-9451
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010079
  issn: 1018-4864
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH8aH4dx2AcwLYxVRtptWMSum6SnqUOgDUFVMT4KlyixHRUJpaVJkfbf7z0nTSkSXHZxFNlRnDzb7_v3AL4JK3WQRG0e-KniysoOnYOGJ1LoqB0Z1KEdzuxp2O9Hw2F3UBvcijqscn4muoPajDXZyA-kCrvIypBd_pg8cKoaRd7VuoTGCqwRSgJtzEHntvEiIP_rOm-nIKNZoOqkmSp1jpJEOSlPrm4hl8uMaSFtPo-VfOYwdXzo-P3_fsEHeFdLoKxXLZmP8Mbmm7DxBJdwC056jELNp3ZUhbezYjZ9tH_ZOGO939y6dCvDJqPKfsWSsqRMfWZs6QK7ctYgwxbbcHl8dHH4i9dFF7juiLDkRupQBSY0QqZaiyzJCCtUZDITNkkTlaEEowVeUdFBbcYIq6Ik9bUf2I6fGdn-BKv5OLefgUltUqptjDKgVSbNIu0b30RGqxTlKt31QMz_eKxrRHIqjHEfL7CUiUoxUil2VIqlB9-bZyYVHsero3fnpIjrvVnECzp4sNd0464iV0mS2_GMxqAkGdJ56EG4tACatxIu93JPfjdy-NyogqGY3fZgf75UFi9_ea47r8_1C7yVFE7jrD-7sFpOZ_YrrOvH8q6YtmAlvL6hdhi1YO3nUX9wjndn_iG1ctBy-wLb8z9X_wC58BAD
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Nb9MwFH-aBhLjwIBtWmCAkeC0WYtdN0kPaKoG08pKxWGTdssS21ErTWlp0qH9U_yNvOd8lE7abjtwysGO7MTP7_v9HsAnYaUOkqjDAz9VXFnZJT5oeCKFjjqRQRva4cwOw9Eourzs_VyDP00tDKVVNjzRMWoz1eQjP5Qq7KEoQ3F5NPvFqWsURVebFhoVWZzZ299oshVfBl_xfD9LefLt_PiU110FuO6KsORG6lAFJjRCplqLLMkIDFNkMhM2SROVoYjWAp-oyaO6boRVUZL62g9s188MAR0gy3-iFF4HShX0j9uoBcrbnouuCnLSBaou0qlK9agolZOx5vokcrkqCJfa7d3czDsBWif3Tjb_tz_2El7UGjbrV1fiFazZ_DU8_wd3cQu-9xml0s_tuErfZ8VifmNv2TRj_QG3rpzMsNm48s-xpCwJiYAZW7rEtZy1yLfFNlw8ysfswHo-ze0uMKlNSr2bUce1yqRZpH3jm8holaLeqHseiOaEY10jrlPjj-t4iRVNVBEjVcSOKmLpwX77zqzCG3lw9l5z9HHNe4p4ee4efGyHkWtQKCjJ7XRBc1BTDonfexCuEFy7KuGOr47kk7HDH0cTE82IjgcHDWkuF79_r28e3usHeHZ6_mMYDwejs7ewISl1yHm69mC9nC_sO3iqb8pJMX_v7hyDq8cm2b_F9Gfh
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB5VBSE48Ea4FFgkOMGq3s3GjwNCESUitIpyAKniYux9KJWQk8ZOUf8av46Z9SOkEr31wMmH9Xu_ncfOzDcAr4WVOsqTAY_CQnFl5ZDkoOG5FDoZJAZ9aM8zexxPp8nJSTrbgd9dLQylVXYy0Qtqs9C0R34gVZyiKkN1eeDatIjZ4fjD8oxTBymKtHbtNBqIHNmLX-i-Ve8nhzjXb6Qcf_r68TNvOwxwPRRxzY3UsYpMbIQstBYud0SMKZx0wuZFrhyqay3wiFY9mu5GWJXkRajDyA5DZ4j0AMX_DbxHSo7fbPi9j2Cg7k19pFXQhl2k2oKdpmyPClQ5OW6-ZyKX20pxY-leztO8FKz1OnB873_-e_fhbmt5s1GzVB7Aji0fwp2_-BgfwZcRoxT7lZ03af2sWq_O7QVbODaacOvLzAxbzpt9O5bXNTEUMGNrn9BWsp4Rt3oM367lY57Abrko7VNgUpuCejqj7WuVKVyiQxOaxGhVoD2p0wBEN9uZbpnYqSHIz2zDIU0IyRAhmUdIJgN421-zbHhIrjx7v4NB1sqkKttgIIBX_TBKEwoR5aVdrOkctKBj0gMBxFvg659KfOTbI-Xp3POSo-uJ7sUggHcdTDcP__e77l39ri_hFiI1O55Mj57BbUkZRX4DbB9269XaPoeb-rw-rVYv_PJj8OO6EfsHvgFw8g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+survey+of+AI-enabled+phishing+attacks+detection+techniques&rft.jtitle=Telecommunication+systems&rft.au=Basit%2C+Abdul&rft.au=Zafar%2C+Maham&rft.au=Liu%2C+Xuan&rft.au=Javed%2C+Abdul+Rehman&rft.date=2021-01-01&rft.issn=1018-4864&rft.eissn=1572-9451&rft.volume=76&rft.issue=1&rft.spage=139&rft.epage=154&rft_id=info:doi/10.1007%2Fs11235-020-00733-2&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11235_020_00733_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1018-4864&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1018-4864&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1018-4864&client=summon