{"id":"https://openalex.org/W4391769266","doi":"https://doi.org/10.1109/ccwc60891.2024.10427626","title":"Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection","display_name":"Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4391769266","doi":"https://doi.org/10.1109/ccwc60891.2024.10427626"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc60891.2024.10427626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039625071","display_name":"Robin Chataut","orcid":"https://orcid.org/0000-0002-2763-9598"},"institutions":[{"id":"https://openalex.org/I43267033","display_name":"Quinnipiac University","ror":"https://ror.org/00mpz5a50","country_code":"US","type":"education","lineage":["https://openalex.org/I43267033"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Robin Chataut","raw_affiliation_strings":["Quinnipiac University,School of Computing and Engineering,Hamden,CT,USA,06518"],"affiliations":[{"raw_affiliation_string":"Quinnipiac University,School of Computing and Engineering,Hamden,CT,USA,06518","institution_ids":["https://openalex.org/I43267033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008803380","display_name":"Prashnna Gyawali","orcid":"https://orcid.org/0000-0003-1201-6993"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Prashnna Kumar Gyawali","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering,Morgantown,West Virginia,USA,26506"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering,Morgantown,West Virginia,USA,26506","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093917812","display_name":"Yusuf Usman","orcid":null},"institutions":[{"id":"https://openalex.org/I43267033","display_name":"Quinnipiac University","ror":"https://ror.org/00mpz5a50","country_code":"US","type":"education","lineage":["https://openalex.org/I43267033"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yusuf Usman","raw_affiliation_strings":["Quinnipiac University,School of Computing and Engineering,Hamden,CT,USA,06518"],"affiliations":[{"raw_affiliation_string":"Quinnipiac University,School of Computing and Engineering,Hamden,CT,USA,06518","institution_ids":["https://openalex.org/I43267033"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039625071"],"corresponding_institution_ids":["https://openalex.org/I43267033"],"apc_list":null,"apc_paid":null,"fwci":21.8257,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.99406619,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"0548","last_page":"0554"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9782059192657471},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7637989521026611},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7427932024002075},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6439011096954346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6280049085617065},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6125269532203674},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5115123987197876},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.348996102809906},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3270106315612793},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09210419654846191},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.06962722539901733}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9782059192657471},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7637989521026611},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7427932024002075},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6439011096954346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6280049085617065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6125269532203674},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5115123987197876},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.348996102809906},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3270106315612793},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09210419654846191},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.06962722539901733},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc60891.2024.10427626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2497967381","https://openalex.org/W3094117827","https://openalex.org/W3179968378","https://openalex.org/W3199958362","https://openalex.org/W4281557260","https://openalex.org/W4281654741","https://openalex.org/W4283026156","https://openalex.org/W4318603353","https://openalex.org/W4319079731","https://openalex.org/W4384071683","https://openalex.org/W4384920109","https://openalex.org/W4386867830","https://openalex.org/W4387162877","https://openalex.org/W4388164388","https://openalex.org/W6838865847","https://openalex.org/W6946620886"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2801622120"],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"continue":[2],"to":[3,17],"be":[4],"a":[5,63,67],"pervasive":[6],"challenge":[7],"in":[8,37,84,117,127],"cybersecurity,":[9],"with":[10,88],"threat":[11],"actors":[12],"constantly":[13],"developing":[14],"new":[15],"strategies":[16],"penetrate":[18],"email":[19,43,118],"inboxes":[20],"and":[21,62,74,101,106,132,140],"compromise":[22],"sensitive":[23],"data.":[24],"In":[25],"this":[26],"study,":[27],"we":[28,52],"investigate":[29],"the":[30,38,46,54,80,99,107,123,144],"effectiveness":[31],"of":[32,41,49,56,82,94,103,125,146],"Large":[33],"Language":[34],"Models":[35],"(LLMs)":[36],"crucial":[39],"task":[40],"phishing":[42,73,86,130],"detection.":[44],"With":[45],"growing":[47],"sophistication":[48],"these":[50],"attacks,":[51],"assess":[53],"performance":[55],"three":[57],"distinct":[58],"LLMs:":[59],"GPT-3.5,":[60,104],"GPT-4,":[61,105],"customized":[64],"ChatGPT,":[65,109],"against":[66],"carefully":[68],"curated":[69],"dataset":[70],"containing":[71],"both":[72],"legitimate":[75],"emails.":[76],"Our":[77],"research":[78],"reveals":[79],"proficiency":[81],"LLMs":[83,126],"identifying":[85,129],"emails,":[87],"each":[89],"model":[90],"showing":[91],"varying":[92],"levels":[93],"success.":[95],"The":[96],"paper":[97],"outlines":[98],"strengths":[100],"limitations":[102],"custom":[108],"illuminating":[110],"their":[111,133],"respective":[112],"suitability":[113],"for":[114,136],"practical":[115],"applications":[116],"security.":[119],"These":[120],"results":[121],"underscore":[122],"potential":[124],"effectively":[128],"emails":[131],"significant":[134],"implications":[135],"enhancing":[137],"cybersecurity":[138],"measures":[139],"safeguarding":[141],"users":[142],"from":[143],"risks":[145],"online":[147],"fraud.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":7}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
