A comprehensive survey of AI-enabled phishing attacks detection techniques
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by...
Gespeichert in:
| Veröffentlicht in: | Telecommunication systems Jg. 76; H. 1; S. 139 - 154 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
Springer US
01.01.2021
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 1018-4864, 1572-9451 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain. |
|---|---|
| AbstractList | In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain. In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain. |
| Author | Liu, Xuan Jalil, Zunera Kifayat, Kashif Javed, Abdul Rehman Basit, Abdul Zafar, Maham |
| Author_xml | – sequence: 1 givenname: Abdul surname: Basit fullname: Basit, Abdul organization: Department of Computer Science, Air University – sequence: 2 givenname: Maham surname: Zafar fullname: Zafar, Maham organization: Department of Computer Science, Air University – sequence: 3 givenname: Xuan orcidid: 0000-0002-7966-4488 surname: Liu fullname: Liu, Xuan email: yusuf@yzu.edu.cn organization: School of Information Engineering, Yangzhou University – sequence: 4 givenname: Abdul Rehman surname: Javed fullname: Javed, Abdul Rehman organization: Department of Cyber Security, Air University – sequence: 5 givenname: Zunera surname: Jalil fullname: Jalil, Zunera organization: Department of Cyber Security, Air University – sequence: 6 givenname: Kashif surname: Kifayat fullname: Kifayat, Kashif organization: Department of Cyber Security, Air University |
| BookMark | eNp9kU1v1DAQhi1URD_gD3CKxIWLweOPOHtBWlV8FFXiAmfLccYbl6y92MlK_fc4bBGih57G1jzvzLwzl-QspoiEvAb2DhjT7wsAF4oyzmj9CkH5M3IBSnO6kQrO6ptBR2XXynNyWcodY6ts84KcCwHAhGQX5Ou2cWl_yDhiLOGITVnyEe-b5JvtDcVo-wmH5jCGMoa4a-w8W_ezNAPO6OaQYlPjGMOvBctL8tzbqeCrh3hFfnz6-P36C7399vnmentLnQI904E7LdtBD8B758Bbr1qQ4LkHtL2VXoqNgxo7XXk5AMrO9syxFhXzAxdX5MOp7mHp9zg4jHO2kznksLf53iQbzP-ZGEazS0ejVQeKiVrg7UOBnNbBZ7MPxeE02YhpKYZLVTsLpllF3zxC79KSY7VXKb3hXHSyrVR3olxOpWT0xoXZruup_cNkgJl18-Z0MFMPZv4czKxm-CPpXx9PisRJVCocd5j_TfWE6jeraamc |
| CitedBy_id | crossref_primary_10_1002_spy2_402 crossref_primary_10_1051_itmconf_20257802010 crossref_primary_10_3390_app132413269 crossref_primary_10_38124_ijisrt_25jul1306 crossref_primary_10_1109_ACCESS_2023_3346045 crossref_primary_10_1007_s00779_024_01794_9 crossref_primary_10_1109_ACCESS_2022_3204171 crossref_primary_10_1155_2022_5036026 crossref_primary_10_1109_TBDATA_2022_3227336 crossref_primary_10_3389_fpubh_2021_788347 crossref_primary_10_3390_fi14030082 crossref_primary_10_3390_technologies11060161 crossref_primary_10_1016_j_jik_2025_100762 crossref_primary_10_62762_TSCC_2024_322898 crossref_primary_10_1016_j_csa_2024_100036 crossref_primary_10_3389_fcomp_2024_1428013 crossref_primary_10_1016_j_eswa_2022_118010 crossref_primary_10_1007_s13399_024_05887_6 crossref_primary_10_1109_ACCESS_2023_3237798 crossref_primary_10_3389_frcmn_2025_1587654 crossref_primary_10_1007_s10586_024_04313_w crossref_primary_10_3390_s24072077 crossref_primary_10_1109_ACCESS_2022_3174554 crossref_primary_10_3390_electronics11010016 crossref_primary_10_3390_s24051672 crossref_primary_10_1109_OJCOMS_2024_3462503 crossref_primary_10_4271_12_07_03_0020 crossref_primary_10_58564_IJSER_3_1_2024_146 crossref_primary_10_1007_s42979_022_01292_w crossref_primary_10_3390_make3030034 crossref_primary_10_1016_j_jksuci_2023_01_004 crossref_primary_10_1016_j_cose_2024_103885 crossref_primary_10_36962_PAHTEI30072023_59 crossref_primary_10_1007_s10462_024_10973_2 crossref_primary_10_1109_JIOT_2023_3247594 crossref_primary_10_1109_ACCESS_2024_3375882 crossref_primary_10_3390_su14084829 crossref_primary_10_1109_ACCESS_2025_3555157 crossref_primary_10_1155_2021_6632747 crossref_primary_10_1177_18724981251337385 crossref_primary_10_3390_electronics13183677 crossref_primary_10_1016_j_eswa_2022_117553 crossref_primary_10_1109_ACCESS_2021_3135870 crossref_primary_10_3390_fi16030086 crossref_primary_10_1007_s10207_025_01095_z crossref_primary_10_17694_bajece_1490596 crossref_primary_10_1177_1088467X251341783 crossref_primary_10_1155_2022_7402085 crossref_primary_10_1109_ACCESS_2024_3486462 crossref_primary_10_3390_electronics12010232 crossref_primary_10_1109_ACCESS_2022_3151903 crossref_primary_10_3390_app13084649 crossref_primary_10_1002_ett_4872 crossref_primary_10_3390_app12188972 crossref_primary_10_1016_j_procs_2023_01_268 crossref_primary_10_3390_telecom4020017 crossref_primary_10_1109_ACCESS_2021_3109091 crossref_primary_10_1016_j_cose_2024_104188 crossref_primary_10_5604_01_3001_0053_7217 crossref_primary_10_1007_s43681_024_00427_4 crossref_primary_10_1007_s00521_021_06401_z crossref_primary_10_1016_j_ins_2023_02_039 crossref_primary_10_1007_s11760_024_03204_2 crossref_primary_10_1155_2021_5561816 crossref_primary_10_1093_comjnl_bxaf036 crossref_primary_10_1007_s10462_025_11338_z crossref_primary_10_1007_s10115_022_01672_x crossref_primary_10_1109_ACCESS_2025_3528114 crossref_primary_10_1007_s11227_021_04250_0 crossref_primary_10_1007_s11277_022_09781_0 crossref_primary_10_1007_s10462_025_11141_w crossref_primary_10_1016_j_eswa_2023_122199 crossref_primary_10_1016_j_procs_2025_04_003 crossref_primary_10_1007_s42979_022_01069_1 crossref_primary_10_1007_s10922_021_09587_8 crossref_primary_10_1109_ACCESS_2023_3293063 crossref_primary_10_3390_electronics12061333 crossref_primary_10_1016_j_cose_2024_103780 crossref_primary_10_1016_j_jisa_2022_103169 crossref_primary_10_1016_j_asoc_2024_112540 crossref_primary_10_1109_TDSC_2023_3234561 crossref_primary_10_1080_19361610_2025_2508726 crossref_primary_10_1016_j_comnet_2025_111375 crossref_primary_10_1080_23742917_2023_2240606 crossref_primary_10_3233_IDT_220307 crossref_primary_10_1007_s10586_024_04272_2 crossref_primary_10_1051_bioconf_20249700059 crossref_primary_10_3390_s23167207 crossref_primary_10_1007_s10462_024_10893_1 crossref_primary_10_3390_s22052017 crossref_primary_10_1177_21695067231192215 crossref_primary_10_1080_0144929X_2023_2230305 crossref_primary_10_1016_j_aej_2025_02_069 crossref_primary_10_1007_s11235_022_00979_y crossref_primary_10_1109_COMST_2024_3382470 crossref_primary_10_1109_ACCESS_2024_3352897 crossref_primary_10_1007_s00521_023_08818_0 crossref_primary_10_1016_j_infsof_2025_107877 crossref_primary_10_1016_j_heliyon_2023_e22947 crossref_primary_10_1051_itmconf_20224701009 crossref_primary_10_1016_j_matpr_2021_07_178 crossref_primary_10_1007_s11277_021_08196_7 crossref_primary_10_1007_s10207_023_00768_x crossref_primary_10_1016_j_jbusres_2023_113987 crossref_primary_10_1007_s11235_021_00799_6 crossref_primary_10_1007_s10586_025_05373_2 crossref_primary_10_1109_ACCESS_2024_3390093 crossref_primary_10_1007_s00779_021_01607_3 crossref_primary_10_1007_s11063_025_11777_3 crossref_primary_10_1007_s00521_021_06305_y crossref_primary_10_3390_math11143217 crossref_primary_10_1002_cpe_7601 crossref_primary_10_1109_ACCESS_2025_3561237 crossref_primary_10_32604_cmc_2023_036422 crossref_primary_10_1109_JPROC_2024_3379855 crossref_primary_10_1109_ACCESS_2022_3142508 crossref_primary_10_1080_10406026_2025_2478045 crossref_primary_10_1109_COMST_2024_3441752 crossref_primary_10_1007_s10462_024_10908_x crossref_primary_10_4102_sajim_v26i1_1763 crossref_primary_10_1007_s11277_023_10736_2 crossref_primary_10_1155_2022_1699657 crossref_primary_10_1155_2022_2975033 crossref_primary_10_1109_ACCESS_2024_3521945 crossref_primary_10_1080_10889868_2024_2439829 crossref_primary_10_1109_ACCESS_2024_3436812 crossref_primary_10_2478_raft_2025_0028 crossref_primary_10_1080_0952813X_2022_2093409 crossref_primary_10_1109_ACCESS_2024_3403197 crossref_primary_10_3390_s21144816 crossref_primary_10_1007_s11235_021_00850_6 crossref_primary_10_1016_j_chb_2025_108734 crossref_primary_10_1109_ACCESS_2023_3247135 |
| Cites_doi | 10.1016/j.ijhcs.2019.02.007 10.1016/j.ijhcs.2018.06.004 10.1109/ICECTA.2017.8252051 10.1016/j.cose.2017.04.006 10.1109/BDCloud.2018.00045 10.1002/ett.3997 10.1186/s13638-019-1361-0 10.1109/ICGEC.2011.25 10.3233/JCS-181253 10.1109/ACCESS.2020.3013699 10.1007/978-3-030-00557-3_46 10.1080/09720510.2020.1799496 10.1109/ACCESS.2020.3003569 10.1016/j.jisa.2019.102419 10.1007/978-3-030-16660-1_12 10.1109/ICICCT.2018.8473085 10.1109/ACCESS.2020.2988160 10.1016/j.procs.2018.03.053 10.1016/j.eswa.2018.07.067 10.1109/ICCC.2013.6731669 10.1109/HICSS.2014.254 10.1016/j.cose.2018.01.015 10.1109/SURV.2013.032213.00009 10.2139/ssrn.3418542 10.1145/3227609.3227655 10.1016/j.procs.2020.02.251 10.1007/978-3-030-24318-0_68 10.1016/j.eswa.2018.03.050 10.1016/j.procs.2018.05.103 10.11591/ijece.v10i1.pp486-493 10.1109/SPIN.2018.8474040 10.1007/s11235-017-0334-z 10.1109/ACCESS.2020.2969780 10.1002/spy2.73 10.1016/j.procs.2020.04.118 10.1016/j.cose.2017.02.004 10.1587/transinf.2018NTI0001 10.1016/j.chb.2018.05.037 10.1007/s00521-016-2275-y 10.1108/EL-05-2019-0118 10.1016/j.eswa.2018.09.029 10.1109/ISI.2017.8004877 10.1007/978-981-13-9155-2_5 10.1016/j.future.2018.11.004 10.1007/978-981-13-1708-8_37 10.14569/IJACSA.2019.0100133 10.1016/j.ins.2019.01.064 10.1016/j.cose.2019.02.004 10.1007/s11235-017-0414-0 10.1109/ICCUBEA.2018.8697412 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Copyright Springer Nature B.V. Jan 2021 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Copyright Springer Nature B.V. Jan 2021 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 3V. 7SC 7SP 7WY 7WZ 7XB 87Z 88I 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ L.- L7M L~C L~D M0C M2P P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U 7X8 5PM |
| DOI | 10.1007/s11235-020-00733-2 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Science Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic MEDLINE - Academic PubMed Central (Full Participant titles) |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Science Journals (Alumni Edition) ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Science Journals ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1572-9451 |
| EndPage | 154 |
| ExternalDocumentID | PMC7581503 10_1007_s11235_020_00733_2 |
| GroupedDBID | -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29Q 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 88I 8FE 8FG 8FL 8FW 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBRH ABBXA ABDBE ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACGOD ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADHKG ADIMF ADKFA ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFDZB AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGQPQ AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHPBZ AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYFIA AYQZM AZFZN AZQEC B-. BA0 BAPOH BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ7 GQ8 GROUPED_ABI_INFORM_RESEARCH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6~ KDC KOV KOW LAK LLZTM M0C M2P M4Y MA- MK~ ML~ MS~ N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I OAM OVD P19 P2P P62 P9O PF0 PHGZT PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI ROL RPX RSV RZC RZD RZK S16 S1Z S26 S27 S28 S3B SAP SBE SCF SCLPG SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZMTXR ZYFGU ~A9 ~EX AAYXX ABFSG ABRTQ ACSTC AEZWR AFFHD AFHIU AFOHR AHWEU AIXLP ATHPR CITATION PHGZM PQGLB 3V. 7SC 7SP 7XB 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U 7X8 5PM |
| ID | FETCH-LOGICAL-c517t-d2c746d7d12bcc1faf56141f2f1eaba4f439c1a4f875174d1e48ab0c06e50fd23 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 172 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000583470800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1018-4864 |
| IngestDate | Tue Nov 04 01:52:34 EST 2025 Thu Nov 20 07:13:50 EST 2025 Tue Nov 04 22:28:22 EST 2025 Sat Nov 29 08:04:36 EST 2025 Tue Nov 18 21:55:06 EST 2025 Wed Apr 09 21:54:46 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Deep learning Advanced phishing techniques Internet security Machine learning Security threats Phishing attack Hybrid learning Cyberattack |
| Language | English |
| License | This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c517t-d2c746d7d12bcc1faf56141f2f1eaba4f439c1a4f875174d1e48ab0c06e50fd23 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Review-3 content type line 23 |
| ORCID | 0000-0002-7966-4488 |
| OpenAccessLink | https://pubmed.ncbi.nlm.nih.gov/PMC7581503 |
| PMID | 33110340 |
| PQID | 2479223846 |
| PQPubID | 45633 |
| PageCount | 16 |
| ParticipantIDs | pubmedcentral_primary_oai_pubmedcentral_nih_gov_7581503 proquest_miscellaneous_2455173070 proquest_journals_2479223846 crossref_citationtrail_10_1007_s11235_020_00733_2 crossref_primary_10_1007_s11235_020_00733_2 springer_journals_10_1007_s11235_020_00733_2 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-01-01 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | Modelling, Analysis, Design and Management |
| PublicationTitle | Telecommunication systems |
| PublicationTitleAbbrev | Telecommun Syst |
| PublicationYear | 2021 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | R Fatima (733_CR23) 2019; 27 KL Chiew (733_CR18) 2018; 106 K Parsons (733_CR52) 2019; 128 M Volkamer (733_CR60) 2017; 71 733_CR50 733_CR51 733_CR53 C Iwendi (733_CR32) 2020; 8 733_CR55 OK Sahingoz (733_CR54) 2019; 117 733_CR57 733_CR14 733_CR58 733_CR15 MA Adebowale (733_CR10) 2019; 115 AK Jain (733_CR35) 2020; 171 A Yasin (733_CR64) 2019; 2 MA Ferrag (733_CR25) 2020; 50 J Mao (733_CR44) 2018; 129 733_CR7 A Kumar (733_CR41) 2020; 10 733_CR8 733_CR46 733_CR9 733_CR47 A Aleroud (733_CR11) 2017; 68 733_CR48 733_CR49 BB Gupta (733_CR27) 2017; 28 SW Liew (733_CR43) 2019; 83 BB Gupta (733_CR28) 2018; 67 733_CR1 EJ Williams (733_CR62) 2018; 120 733_CR2 733_CR3 733_CR4 733_CR5 H Hota (733_CR29) 2018; 132 733_CR6 J Mao (733_CR45) 2019; 2019 SR Curtis (733_CR21) 2018; 87 733_CR30 S Jagadeesan (733_CR33) 2018; 118 YA Alsariera (733_CR13) 2020; 8 KL Chiew (733_CR19) 2019; 484 733_CR31 733_CR36 733_CR37 733_CR38 733_CR39 AA Ubing (733_CR59) 2019; 10 W Ali (733_CR12) 2020; 8 M Khonji (733_CR40) 2013; 15 A Subasi (733_CR56) 2020; 168 733_CR61 K Cabaj (733_CR16) 2018; 75 AK Jain (733_CR34) 2018; 68 733_CR63 733_CR20 YH Chen (733_CR17) 2019; 102 A El Aassal (733_CR22) 2020; 8 733_CR65 Y Li (733_CR42) 2019; 94 733_CR24 733_CR26 |
| References_xml | – volume: 128 start-page: 17 year: 2019 ident: 733_CR52 publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2019.02.007 – volume: 120 start-page: 1 year: 2018 ident: 733_CR62 publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2018.06.004 – ident: 733_CR37 – ident: 733_CR57 doi: 10.1109/ICECTA.2017.8252051 – volume: 68 start-page: 160 year: 2017 ident: 733_CR11 publication-title: Computers and Security doi: 10.1016/j.cose.2017.04.006 – ident: 733_CR63 doi: 10.1109/BDCloud.2018.00045 – ident: 733_CR47 doi: 10.1002/ett.3997 – volume: 2019 start-page: 43 issue: 1 year: 2019 ident: 733_CR45 publication-title: EURASIP Journal on Wireless Communications and Networking doi: 10.1186/s13638-019-1361-0 – ident: 733_CR4 – ident: 733_CR24 doi: 10.1109/ICGEC.2011.25 – volume: 27 start-page: 581 issue: 6 year: 2019 ident: 733_CR23 publication-title: Journal of Computer Security doi: 10.3233/JCS-181253 – ident: 733_CR8 – volume: 8 start-page: 142532 year: 2020 ident: 733_CR13 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3013699 – ident: 733_CR31 doi: 10.1007/978-3-030-00557-3_46 – ident: 733_CR46 doi: 10.1080/09720510.2020.1799496 – volume: 118 start-page: 4159 issue: 20 year: 2018 ident: 733_CR33 publication-title: International Journal of Pure and Applied Mathematics – volume: 8 start-page: 116766 year: 2020 ident: 733_CR12 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3003569 – volume: 50 start-page: 102419 year: 2020 ident: 733_CR25 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2019.102419 – ident: 733_CR50 doi: 10.1007/978-3-030-16660-1_12 – ident: 733_CR51 doi: 10.1109/ICICCT.2018.8473085 – volume: 8 start-page: 72650 year: 2020 ident: 733_CR32 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2988160 – volume: 129 start-page: 224 year: 2018 ident: 733_CR44 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2018.03.053 – volume: 115 start-page: 300 year: 2019 ident: 733_CR10 publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2018.07.067 – ident: 733_CR36 doi: 10.1109/ICCC.2013.6731669 – ident: 733_CR3 – ident: 733_CR20 doi: 10.1109/HICSS.2014.254 – volume: 75 start-page: 24 year: 2018 ident: 733_CR16 publication-title: Computers and Security doi: 10.1016/j.cose.2018.01.015 – ident: 733_CR7 – ident: 733_CR26 – volume: 15 start-page: 2091 issue: 4 year: 2013 ident: 733_CR40 publication-title: IEEE Communications Surveys and Tutorials doi: 10.1109/SURV.2013.032213.00009 – ident: 733_CR39 doi: 10.2139/ssrn.3418542 – ident: 733_CR61 doi: 10.1145/3227609.3227655 – volume: 168 start-page: 272 year: 2020 ident: 733_CR56 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2020.02.251 – ident: 733_CR14 doi: 10.1007/978-3-030-24318-0_68 – volume: 106 start-page: 1 year: 2018 ident: 733_CR18 publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2018.03.050 – volume: 132 start-page: 900 year: 2018 ident: 733_CR29 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2018.05.103 – volume: 10 start-page: 486 issue: 1 year: 2020 ident: 733_CR41 publication-title: International Journal of Electrical and Computer Engineering doi: 10.11591/ijece.v10i1.pp486-493 – ident: 733_CR58 doi: 10.1109/SPIN.2018.8474040 – ident: 733_CR2 – volume: 67 start-page: 247 issue: 2 year: 2018 ident: 733_CR28 publication-title: Telecommunication Systems doi: 10.1007/s11235-017-0334-z – volume: 8 start-page: 22170 year: 2020 ident: 733_CR22 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2969780 – ident: 733_CR6 – volume: 2 start-page: e73 issue: 4 year: 2019 ident: 733_CR64 publication-title: Security and Privacy doi: 10.1002/spy2.73 – volume: 171 start-page: 1102 year: 2020 ident: 733_CR35 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2020.04.118 – volume: 71 start-page: 100 year: 2017 ident: 733_CR60 publication-title: Computers and Security doi: 10.1016/j.cose.2017.02.004 – volume: 102 start-page: 878 issue: 5 year: 2019 ident: 733_CR17 publication-title: IEICE Transactions on Information and Systems doi: 10.1587/transinf.2018NTI0001 – volume: 87 start-page: 174 year: 2018 ident: 733_CR21 publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2018.05.037 – volume: 28 start-page: 3629 issue: 12 year: 2017 ident: 733_CR27 publication-title: Neural Computing and Applications doi: 10.1007/s00521-016-2275-y – ident: 733_CR55 – ident: 733_CR38 – ident: 733_CR65 doi: 10.1108/EL-05-2019-0118 – volume: 117 start-page: 345 year: 2019 ident: 733_CR54 publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2018.09.029 – ident: 733_CR9 doi: 10.1109/ISI.2017.8004877 – ident: 733_CR30 – ident: 733_CR15 doi: 10.1007/978-981-13-9155-2_5 – volume: 94 start-page: 27 year: 2019 ident: 733_CR42 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.11.004 – ident: 733_CR48 doi: 10.1007/978-981-13-1708-8_37 – ident: 733_CR1 – volume: 10 start-page: 252 issue: 1 year: 2019 ident: 733_CR59 publication-title: International Journal of Advanced Computer Science and Applications doi: 10.14569/IJACSA.2019.0100133 – volume: 484 start-page: 153 year: 2019 ident: 733_CR19 publication-title: Information Sciences doi: 10.1016/j.ins.2019.01.064 – volume: 83 start-page: 201 year: 2019 ident: 733_CR43 publication-title: Computers and Security doi: 10.1016/j.cose.2019.02.004 – volume: 68 start-page: 687 issue: 4 year: 2018 ident: 733_CR34 publication-title: Telecommunication Systems doi: 10.1007/s11235-017-0414-0 – ident: 733_CR49 – ident: 733_CR53 doi: 10.1109/ICCUBEA.2018.8697412 – ident: 733_CR5 |
| SSID | ssj0010079 |
| Score | 2.6105626 |
| SecondaryResourceType | review_article |
| Snippet | In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a... |
| SourceID | pubmedcentral proquest crossref springer |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 139 |
| SubjectTerms | Access control Artificial Intelligence Business and Management Computer Communication Networks Copying Cybercrime IT in Business Literature reviews Machine learning Phishing Probability Theory and Stochastic Processes Social networks Telecommunications systems Websites |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH_aGIftAGMfIgMmT9ptWItdJ05OqEJUbIeKw5DQLpE_VaQpLU2KtP9-fk6aUiS47JSDHdnJe_b7_j2Ar8JoVYgS08pzR4UsMqozl1KECZSjbBQ07jQ2m5DTaXFzU171DremT6tc34nxorZzgz7y71zIMoiyIC7PFncUu0ZhdLVvofESXiFKAh7Mq-z3EEUI8q-M0U6GTrNc9EUzXekcFolSNJ5i30LKtwXTRtt8nCv5KGAa5dBk_3-_4C3s9RooGXcscwAvXP0O3jzAJXwPP8cEU82Xbtalt5Nmtbx3f8nck_EP6mK5lSWLWee_IqptsVKfWNfGxK6aDMiwzQe4nlz8Or-kfdMFajImW2q5kSK30jKujWFeecQKZZ575pRWwgcNxrDwDIZOsGYsc6JQOjVp7rLUWz76CDv1vHaHQIKdnulCBzs1c0JZpbkrfapk6QXTIjcJsPUfr0yPSI6NMf5UGyxlpFIVqFRFKlU8gW_DO4sOj-PZ2cdrUlT92WyqDR0S-DIMh1OFoRJVu_kK5wRNUuJ9mIDcYoBhVcTl3h6pb2cRnzuYYEHNHiVwumaVzeJP7_XT83s9gtcc02mi9-cYdtrlyp3Arrlvb5vl58j3_wBoywlA priority: 102 providerName: ProQuest |
| Title | A comprehensive survey of AI-enabled phishing attacks detection techniques |
| URI | https://link.springer.com/article/10.1007/s11235-020-00733-2 https://www.proquest.com/docview/2479223846 https://www.proquest.com/docview/2455173070 https://pubmed.ncbi.nlm.nih.gov/PMC7581503 |
| Volume | 76 |
| WOSCitedRecordID | wos000583470800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1572-9451 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010079 issn: 1018-4864 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED_BxgM8MD5FYKuMxBtYil0nTh7LtGkgUVXjq_ASOY6tTkLp1KST-O-5c5N0nQAJXhxFduLoHNu_8939DuCVsqXJVE5u5anjSmcJLxMXc6IJ1ONkjIg7Dskm9HSazef5rAsKa3pv994kGVbqbbAbhXVyUndCpkGOC-8-bncZTcfzj18G2wHW5sHGKeioLFVdqMzv37G7HW0x5k0PyRtm0rD7nB7833c_gPsd2mSTze_xEG65-hHcu8ZB-BjeTxi5la_cYuPKzpr16sr9ZEvPJu-4C6FVFbtcbM6qmGlbispnlWuDE1fNBhbY5gl8Pj35dHzGuwQL3CZCt7ySVqu00pWQpbXCG0-8oMJLL5wpjfKIVqzAKyo1qLlUwqnMlLGNU5fEvpLjp7BXL2v3DBjq5EmZlaiTJk6ZypTS5T42OvdKlCq1EYhezoXt2McpCcaPYsubTHIqUE5FkFMhI3g9PHO54d74a-vDfviKbh42hVQ6RwCEICuCl0M1ziAyi5jaLdfUBlGjprUvAr0z7EOvxMG9W1NfLAIXN6pbCKnHEbzpB3_b-Z-_9fm_NX8BdyW50oSTn0PYa1drdwR37FV70axGcFt__UblPBvB_tuT6ewc7z7Ex1TKGZaz5PsozJFfki0FRg |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB5VBQl64I0IFDASnMAi9jpxckBoVai6tKw4FKm3YDu2thLKbjfZov4pfiMe57FsJXrrgVMOTmQ7Hs97vgF4LYxWmcgxrTy1VMgsoTqxMUWYQDlKRl7jjkOzCTmdZicn-bct-N3XwmBaZc8TA6Mu5wZ95O-5kLkXZV5cflycUewahdHVvoVGSxaH9uKXN9nqD5NP_nzfcL7_-XjvgHZdBahJmGxoyY0UaSlLxrUxzCmHYJjMcces0ko4L6IN80-vyXt1vWRWZErHJk5tErsSgQ48y78hhN8OpgrGe0PUwsvbPERXGTrpUtEV6bSleliUStFYC30SKd8UhGvt9nJu5qUAbZB7-3f_tz92D-50GjYZt1fiPmzZ6gHs_IW7-BC-jAmm0i_trE3fJ_VqeW4vyNyR8YTaUE5WksWs9c8R1TSIREBK24TEtYoMyLf1I_h-LZt5DNvVvLJPgFg9SnSmvR2eWKFKpbnNXaxk7gTTIjURsP6EC9MhrmPjj5_FGisaqaLwVFEEqih4BG-HbxYt3siVb-_2R190vKcu1ucewath2HMNDAWpys5X-I7XlCXy-wjkBsENsyLu-OZIdToL-OPexPRmxCiCdz1prif_91qfXr3Wl3Dr4PjrUXE0mR4-g9scU4eCp2sXtpvlyj6Hm-a8Oa2XL8KdI_Djukn2D8B8Z5U |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB5VBSE4UF4VCwWMBCewuna8690DqiJKRCiKcgCp4rLYXluphDYh2RT1r_Hr8HgfIZXorQdOe_C-_XkenplvAF4Jo1UmckwrTy0VMkuoTmxMkSZQDpKBt7jj0GxCTibZ6Wk-3YHfXS0MplV2MjEI6nJucI_8kAuZe1Xm1eWha9Mipsejo8VPih2kMNLatdNoIHJiL3559231bnzs5_o156MPX95_pG2HAWoSJmtaciNFWsqScW0Mc8ohMSZz3DGrtBLOq2vD_NFb9d50L5kVmdKxiVObxK5E0gMv_m_4e-To-E2Tb30Ew-vePERaGW7YpaIt2GnK9rBAlaLjFnomUr6tFDeW7uU8zUvB2qADR3v_89-7B3dby5sMm6VyH3Zs9QDu_MXH-BA-DQmm2C_trEnrJ6v18txekLkjwzG1ocysJItZs29HVF0jQwEpbR0S2irSM-KuHsHXa_mYfdit5pV9DMTqQaIz7f3zxApVKs1t7mIlcyeYFqmJgHWzXZiWiR0bgvwoNhzSiJDCI6QICCl4BG_6axYND8mVZx90MChambQqNhiI4GU_7KUJhohUZedrPMdb0BL1QARyC3z9U5GPfHukOpsFXnLvenr3YhDB2w6mm4f_-12fXP2uL-CWR2rxeTw5eQq3OWYUhQ2wA9itl2v7DG6a8_pstXwelh-B79eN2D-sRXCm |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+survey+of+AI-enabled+phishing+attacks+detection+techniques&rft.jtitle=Telecommunication+systems&rft.au=Basit%2C+Abdul&rft.au=Zafar%2C+Maham&rft.au=Liu%2C+Xuan&rft.au=Javed%2C+Abdul+Rehman&rft.date=2021-01-01&rft.pub=Springer+US&rft.issn=1018-4864&rft.eissn=1572-9451&rft.volume=76&rft.issue=1&rft.spage=139&rft.epage=154&rft_id=info:doi/10.1007%2Fs11235-020-00733-2&rft.externalDocID=10_1007_s11235_020_00733_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1018-4864&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1018-4864&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1018-4864&client=summon |