{"id":"https://openalex.org/W4401453369","doi":"https://doi.org/10.1109/hsi61632.2024.10613528","title":"Evaluating the Efficacy of Large Language Models in Identifying Phishing Attempts","display_name":"Evaluating the Efficacy of Large Language Models in Identifying Phishing Attempts","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4401453369","doi":"https://doi.org/10.1109/hsi61632.2024.10613528"},"language":"en","primary_location":{"id":"doi:10.1109/hsi61632.2024.10613528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hsi61632.2024.10613528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on Human System Interaction (HSI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102956204","display_name":"Het Patel","orcid":"https://orcid.org/0009-0005-9364-9435"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Het Patel","raw_affiliation_strings":["Western University,Department of Computer Science,London,Ontario"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,Ontario","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011435694","display_name":"Umair Rehman","orcid":"https://orcid.org/0000-0001-7716-6509"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Umair Rehman","raw_affiliation_strings":["Western University,Department of Computer Science,London,Ontario"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,Ontario","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068447696","display_name":"Farkhund Iqbal","orcid":"https://orcid.org/0000-0001-9081-3598"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Farkhund Iqbal","raw_affiliation_strings":["College of Technological Innovation, Zayed University,Zubai,United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University,Zubai,United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102956204"],"corresponding_institution_ids":["https://openalex.org/I125749732"],"apc_list":null,"apc_paid":null,"fwci":4.071,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94412067,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7222779989242554},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7058812379837036},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.38298889994621277},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33691224455833435},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2613515257835388},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1831556260585785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7222779989242554},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7058812379837036},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.38298889994621277},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33691224455833435},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2613515257835388},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1831556260585785}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hsi61632.2024.10613528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hsi61632.2024.10613528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on Human System Interaction (HSI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2028223155","https://openalex.org/W2094117760","https://openalex.org/W2113449956","https://openalex.org/W2153245338","https://openalex.org/W2339166448","https://openalex.org/W2572193563","https://openalex.org/W2808538957","https://openalex.org/W2952402849","https://openalex.org/W2963562762","https://openalex.org/W2988707515","https://openalex.org/W2991305957","https://openalex.org/W3097204310","https://openalex.org/W3123969097","https://openalex.org/W3133843004","https://openalex.org/W3184796286","https://openalex.org/W3187134297","https://openalex.org/W3200092677","https://openalex.org/W4225808286","https://openalex.org/W4253707770","https://openalex.org/W4323256981","https://openalex.org/W4323706279","https://openalex.org/W4382794679","https://openalex.org/W4383988334","https://openalex.org/W4385469325","https://openalex.org/W4385565879","https://openalex.org/W4389216598","https://openalex.org/W4389977189","https://openalex.org/W4390195781","https://openalex.org/W4390970201","https://openalex.org/W4391095288","https://openalex.org/W4391097066","https://openalex.org/W4391766565","https://openalex.org/W4391855109","https://openalex.org/W4392669704"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W3204019825"],"abstract_inverted_index":{"Phishing,":[0],"a":[1,8,103,124],"prevalent":[2],"cybercrime":[3,24],"tactic":[4],"for":[5],"decades,":[6],"remains":[7],"significant":[9],"threat":[10],"in":[11,41,96,150],"today's":[12],"digital":[13],"world.":[14],"By":[15,50],"leveraging":[16],"clever":[17],"social":[18,58],"engineering":[19],"elements":[20,54],"and":[21,29,34,60,71,144],"modern":[22,80],"technology,":[23,81],"targets":[25],"many":[26,42],"individuals,":[27],"businesses,":[28],"organizations":[30],"to":[31,45,86,113],"exploit":[32],"trust":[33],"security.":[35],"These":[36],"cyber-attackers":[37],"are":[38],"often":[39],"disguised":[40],"trustworthy":[43],"forms":[44],"appear":[46],"as":[47],"legitimate":[48],"sources.":[49],"cleverly":[51],"using":[52],"psychological":[53],"like":[55],"urgency,":[56],"fear,":[57],"proof,":[59],"other":[61],"manipulative":[62],"strategies,":[63],"phishers":[64],"can":[65,117],"lure":[66],"individuals":[67],"into":[68],"revealing":[69],"sensitive":[70],"personalized":[72],"information.":[73],"Building":[74],"on":[75,102,131],"this":[76,82],"pervasive":[77],"issue":[78],"within":[79],"paper":[83],"will":[84],"aim":[85],"analyze":[87],"the":[88,138,147],"effectiveness":[89],"of":[90,106],"15":[91],"Large":[92],"Language":[93],"Models":[94],"(LLMs)":[95],"detecting":[97,151],"phishing":[98,120,152],"attempts,":[99],"specifically":[100],"focusing":[101],"randomized":[104],"set":[105],"\u201c419":[107],"Scam\u201d":[108],"emails.":[109,153],"The":[110,134],"objective":[111],"is":[112],"determine":[114],"which":[115],"LLMs":[116],"accurately":[118],"detect":[119],"emails":[121],"by":[122],"analyzing":[123],"text":[125],"file":[126],"containing":[127],"email":[128],"metadata":[129],"based":[130],"predefined":[132],"criteria.":[133],"experiment":[135],"concluded":[136],"that":[137],"following":[139],"models,":[140],"ChatGPT":[141],"3.5,":[142],"GPT-3.5-Turbo-Instruct,":[143],"ChatGPT,":[145],"were":[146],"most":[148],"effective":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-02-25T08:12:03.925757","created_date":"2025-10-10T00:00:00"}
