Using Clustering Algorithms to Automatically Identify Phishing Campaigns

Attackers attempt to create successful phishing campaigns by sending out trustworthy-looking emails with a range of variations, such as adding the recipient name in the subject line or changing URLs in email body. These tactics are used to bypass filters and make it difficult for the information sys...

Full description

Bibliographic Details
Main Authors: Kholoud Althobaiti, Maria K. Wolters, Nawal Alsufyani, Kami Vaniea
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10235951/