A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks
Authors
Keywords
-
Journal
DECISION SUPPORT SYSTEMS
Volume -, Issue -, Pages 114102
Publisher
Elsevier BV
Online
2023-10-04
DOI
10.1016/j.dss.2023.114102
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings
- (2022) Ahmet Selman Bozkir et al. COMPUTERS & SECURITY
- Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering
- (2022) Manas Tripathi et al. INFORMATION & MANAGEMENT
- A survey of phishing attack techniques, defence mechanisms and open research challenges
- (2021) Ankit Kumar Jain et al. Enterprise Information Systems
- Reconciling business intelligence, analytics and decision support systems: More data, deeper insight
- (2021) Gloria Phillips-Wren et al. DECISION SUPPORT SYSTEMS
- Expanding the Gordon-Loeb model to cyber-insurance
- (2021) Henry R.K. Skeoch COMPUTERS & SECURITY
- Managing Information System Security Under Continuous and Abrupt Deterioration
- (2020) Alain Bensoussan et al. PRODUCTION AND OPERATIONS MANAGEMENT
- Transparency and accountability in AI decision support: Explaining and visualizing convolutional neural networks for text information
- (2020) Buomsoo Kim et al. DECISION SUPPORT SYSTEMS
- The Effects of Explainability and Causability on Perception, Trust, and Acceptance: Implications for Explainable AI
- (2020) Full Professor Donghee Shin INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics
- (2019) Victor Benjamin et al. MIS QUARTERLY
- Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
- (2019) Alessandro Mazzoccoli et al. RISK ANALYSIS
- A linguistic signaling model of social support exchange in online health communities
- (2019) Langtao Chen et al. DECISION SUPPORT SYSTEMS
- XAI—Explainable artificial intelligence
- (2019) David Gunning et al. Science Robotics
- Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
- (2018) Sami Smadi et al. DECISION SUPPORT SYSTEMS
- Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
- (2018) Mohammad Mahdi Khalili et al. IEEE Transactions on Information Forensics and Security
- Heuristic nonlinear regression strategy for detecting phishing websites
- (2018) Mehdi Babagoli et al. SOFT COMPUTING
- Machine Learning Based Phishing Detection from URLs
- (2018) Ozgur Koray Sahingoz et al. EXPERT SYSTEMS WITH APPLICATIONS
- Imbalance: Oversampling algorithms for imbalanced classification in R
- (2018) Ignacio Cordón et al. KNOWLEDGE-BASED SYSTEMS
- Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
- (2017) Sagar Samtani et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Towards detection of phishing websites on client-side using machine learning based approach
- (2017) Ankit Kumar Jain et al. TELECOMMUNICATION SYSTEMS
- Phishing: An economic analysis of cybercrime perpetrators
- (2016) Christian Konradt et al. COMPUTERS & SECURITY
- A phish detector using lightweight search features
- (2016) Gaurav Varshney et al. COMPUTERS & SECURITY
- PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
- (2016) Choon Lin Tan et al. DECISION SUPPORT SYSTEMS
- A framework for incorporating insurance in critical infrastructure cyber risk strategies
- (2016) Derek Young et al. International Journal of Critical Infrastructure Protection
- Security for mobile and cloud frontiers in healthcare
- (2015) David Kotz et al. COMMUNICATIONS OF THE ACM
- Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors
- (2015) Bin Srinidhi et al. DECISION SUPPORT SYSTEMS
- The classification of hackers by knowledge exchange behaviors
- (2015) Xiong Zhang et al. INFORMATION SYSTEMS FRONTIERS
- Online deception in social media
- (2014) Michail Tsikerdekis et al. COMMUNICATIONS OF THE ACM
- Analyzing firm-specific social media and market: A stakeholder-based event analysis framework
- (2014) Shan Jiang et al. DECISION SUPPORT SYSTEMS
- Do phishing alerts impact global corporations? A firm value analysis
- (2014) Indranil Bose et al. DECISION SUPPORT SYSTEMS
- Cyber-risk decision models: To insure IT or not?
- (2013) Arunabha Mukhopadhyay et al. DECISION SUPPORT SYSTEMS
- Predicting phishing websites based on self-structuring neural network
- (2013) Rami M. Mohammad et al. NEURAL COMPUTING & APPLICATIONS
- CANTINA+
- (2011) Guang Xiang et al. ACM Transactions on Information and System Security
- Absolute continuous bivariate generalized exponential distribution
- (2011) Debasis Kundu et al. AStA-Advances in Statistical Analysis
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self-Protection
- (2010) Hulisi Öğüt et al. RISK ANALYSIS
- Why IT managers don't go for cyber-insurance products
- (2009) Tridib Bandyopadhyay et al. COMMUNICATIONS OF THE ACM
- A bivariate distribution with gamma and beta marginals with application to drought data
- (2008) Saralees Nadarajah JOURNAL OF APPLIED STATISTICS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started