{"id":"https://openalex.org/W4387076370","doi":"https://doi.org/10.48550/arxiv.2309.14166","title":"Targeted Attacks: Redefining Spear Phishing and Business Email Compromise","display_name":"Targeted Attacks: Redefining Spear Phishing and Business Email Compromise","publication_year":2023,"publication_date":"2023-09-25","ids":{"openalex":"https://openalex.org/W4387076370","doi":"https://doi.org/10.48550/arxiv.2309.14166"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2309.14166","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.14166","pdf_url":"https://arxiv.org/pdf/2309.14166","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2309.14166","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024027566","display_name":"Sarah Wassermann","orcid":"https://orcid.org/0000-0003-4068-3742"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wassermann, Sarah","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089236281","display_name":"Maxime Meyer","orcid":"https://orcid.org/0000-0002-8652-597X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meyer, Maxime","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075567899","display_name":"S\u00e9bastien Goutal","orcid":"https://orcid.org/0000-0001-7797-0740"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Goutal, S\u00e9bastien","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5013683743","display_name":"Damien Riquet","orcid":"https://orcid.org/0009-0004-9835-9878"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Riquet, Damien","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024027566"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9342490434646606},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.8214400410652161},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7921445369720459},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6738201379776001},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.622564435005188},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6063543558120728},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5805982351303101},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.5242781043052673},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5019254684448242},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.5006985664367676},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4871315658092499},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.47606155276298523},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.4216215908527374},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3968903720378876},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.33753252029418945},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18564638495445251},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09792926907539368}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9342490434646606},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.8214400410652161},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7921445369720459},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6738201379776001},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.622564435005188},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6063543558120728},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5805982351303101},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.5242781043052673},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5019254684448242},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.5006985664367676},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4871315658092499},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.47606155276298523},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.4216215908527374},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3968903720378876},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33753252029418945},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18564638495445251},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09792926907539368},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2309.14166","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.14166","pdf_url":"https://arxiv.org/pdf/2309.14166","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2309.14166","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2309.14166","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2309.14166","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.14166","pdf_url":"https://arxiv.org/pdf/2309.14166","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387076370.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1648378477","https://openalex.org/W2032900633","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W2595760708","https://openalex.org/W1981963489","https://openalex.org/W2121587354","https://openalex.org/W2765340726","https://openalex.org/W2139969188","https://openalex.org/W2911255625"],"abstract_inverted_index":{"In":[0],"today's":[1],"digital":[2],"world,":[3],"cybercrime":[4],"is":[5],"responsible":[6],"for":[7],"significant":[8],"damage":[9],"to":[10],"organizations,":[11],"including":[12],"financial":[13],"losses,":[14],"operational":[15],"disruptions,":[16],"or":[17,44],"intellectual":[18],"property":[19],"theft.":[20],"Cyberattacks":[21],"often":[22],"start":[23],"with":[24,90],"an":[25],"email,":[26],"the":[27,52],"major":[28],"means":[29],"of":[30],"corporate":[31],"communication.":[32],"Some":[33],"rare,":[34],"severely":[35],"damaging":[36],"email":[37],"threats":[38],"-":[39,48,89,96],"known":[40],"as":[41,76,78,93],"spear":[42],"phishing":[43],"Business":[45],"Email":[46],"Compromise":[47],"have":[49],"emerged.":[50],"However,":[51],"literature":[53],"disagrees":[54],"on":[55],"their":[56],"definition,":[57],"impeding":[58],"security":[59],"vendors":[60],"and":[61,97,100],"researchers":[62],"from":[63],"mitigating":[64],"targeted":[65,70,101],"attacks.":[66,71],"Therefore,":[67],"we":[68,85],"introduce":[69],"We":[72],"describe":[73],"targeted-attack-detection":[74],"techniques":[75],"well":[77],"social-engineering":[79],"methods":[80],"used":[81],"by":[82],"fraudsters.":[83],"Additionally,":[84],"present":[86],"text-based":[87],"attacks":[88],"textual":[91],"content":[92],"malicious":[94],"payload":[95],"compare":[98],"non-targeted":[99],"variants.":[102]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2023-09-27T00:00:00"}
