<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gaetano Cimino</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Deufemia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Salerno</institution>
          ,
          <addr-line>via Giovanni Paolo II, Fisciano (SA), 84084</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Vishing attacks, a prevalent manifestation of social engineering, exploit human trust and manipulation over phone calls to illicitly obtain sensitive information. As these attacks evolve in sophistication, traditional defense mechanisms struggle to maintain eficacy, necessitating the exploration of alternative solutions. In this context, Large Language Models (LLMs) emerge as a cornerstone for fortifying defenses against vishing attacks. Through harnessing the profound linguistic knowledge embedded within LLMs, there exists the potential to comprehensively analyze conversations, identify subtle indicators characteristic of vishing, and dynamically generate adaptive countermeasures in real-time. This position paper underscores the promising role of LLMs in enhancing cybersecurity defenses against vishing, thereby laying the groundwork for further exploration and advancement in this critical domain.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        With the exponential advancement of communication technologies, the landscape of fraudulent
activities has evolved, presenting new challenges for cybersecurity. One such challenge is the rise
of vishing, a form of social engineering where attackers manipulate individuals into divulging
sensitive information over the phone under false pretenses
        <xref ref-type="bibr" rid="ref16 ref20 ref7">(Salahdine and Kaabouch 2019;
Tulkarm 2021)</xref>
        . According to statistics provided by the Federal Trade Commission, during the
sole year of 2020, there were over 128,000 occurrences of fraudulent schemes perpetrated through
telephone communications, culminating in a significant financial detriment amounting to $108
million for the victims involved1. Vishing, derived from “voice” and “phishing”, exploits human
psychology and trust, making it a valuable tool for cybercriminals to exploit vulnerabilities in
individuals and organizations alike. This trend has been further magnified by the widespread
adoption of remote work and virtual interactions on a global scale, particularly accelerated
by events such as the COVID-19 pandemic, which has created a fertile environment for the
proliferation of vishing attacks. As individuals increasingly rely on digital communication
channels for work, socializing, and commerce, they become more susceptible to manipulation
and deception over the phone. The absence of visual cues in telephonic conversations exacerbates
this vulnerability, as individuals are forced to rely solely on auditory cues and verbal interactions
to assess the authenticity of the caller. Furthermore, vishing attacks often target specific
demographics or industries, exploiting social or cultural norms to increase their efectiveness.
For example, attackers may leverage knowledge obtained from social media or data breaches to
personalize their attacks, enhancing their credibility and persuasiveness. Alternatively, they
may impersonate trusted authority figures, such as bank representatives or government oficials,
to instill a sense of urgency or fear in their targets. An illustration of such a scenario was
documented by The Wall Street Journal, wherein a vishing attack led to the CEO of a British
energy company transferring $243,000 to the bank account of an assailant under the erroneous
belief that he was engaged in a legitimate conversation with his superior2.
      </p>
      <p>
        Traditional defense mechanisms, such as spam filters and blacklisting
        <xref ref-type="bibr" rid="ref13">(Miramirkhani, Starov,
and Nikiforakis 2016)</xref>
        , are proving inadequate in light of evolving attack tactics and the sheer
volume of fraudulent calls. Therefore, in response to the escalating threat posed by vishing
attacks, cybersecurity researchers and practitioners are exploring innovative detection approaches
        <xref ref-type="bibr" rid="ref11 ref11 ref14 ref14 ref3">(Dissanayake et al. 2023; Moussavou Boussougou and Park 2023; Lee and Park 2023)</xref>
        . While
technical solutions can efectively support users in detecting vishing attacks, they may not
impart users with the knowledge necessary to enhance their accuracy in recognizing vishing
attempts
        <xref ref-type="bibr" rid="ref6">(Huang et al. 2022)</xref>
        . Indeed, users must be equipped to comprehend the consequences
of their actions and learn to engage in more secure practices
        <xref ref-type="bibr" rid="ref2">(Desman 2003)</xref>
        . Concerning
this matter, there has been a rapid proliferation of security and awareness training initiatives
        <xref ref-type="bibr" rid="ref10 ref17">(Siponen 2000; Kävrestad and Nohlberg 2021)</xref>
        , which aim to educate users on what actions to
take, why they are necessary, and how to execute them. This shift towards the development of
human-technical solutions involves the generation of adaptive aids in real-time to prevent users
from inadvertently falling victim to social engineering attacks and reduce their susceptibility
        <xref ref-type="bibr" rid="ref6">(Huang et al. 2022)</xref>
        . In this context, Large Language Models (LLMs) possess the potential to
serve as an efective tool for mitigating vishing. By leveraging LLMs to analyze conversations
and detect linguistic patterns indicative of attack attempts, the aim is to equip individuals and
organizations with timely guidance against social engineering attacks
        <xref ref-type="bibr" rid="ref21 ref5">(Uddin and Sarker 2024;
Heiding et al. 2024)</xref>
        . Moreover, the iterative nature of LLM-based approaches enables continuous
learning and adaptation to new attack vectors, enhancing their efectiveness in dynamic threat
environments.
      </p>
      <p>This position paper seeks to explore the intersection of vishing attacks, communication
technologies, and LLM-based mitigation strategies, with a focus on developing an approach to
address the evolving challenges posed by vishing attacks, ultimately enhancing the resilience of
individuals and organizations against fraudulent activities perpetrated over telecommunication
channels.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        In the early stages of vishing detection, the strategy of phone blacklisting emerged as a prevalent
method. This entailed the compilation of databases containing identified scam numbers, typically
sourced from user submissions. Tran et al.
        <xref ref-type="bibr" rid="ref19">(Tran, Hoai, and Choo 2020)</xref>
        delved into this technique
further, exploring a blacklisting and whitelisting-based detection approach through their iCaMs
system. This system utilizes machine learning (ML) for validating phone numbers within a
2https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402
client-server architecture. Similarly, Zhang and Gurtov
        <xref ref-type="bibr" rid="ref24">(Zhang and Gurtov 2009)</xref>
        proposed
a detection system that relies on recipient whitelists to establish connections with callers.
Jeong and Lim
        <xref ref-type="bibr" rid="ref16 ref7">(Jeong and Lim 2019)</xref>
        addressed vishing through an intelligence-based detection
model, which integrates blacklisting-based and scenario-based rule models with convolutional
neural networks (CNNs) to enhance the accuracy of detecting abnormal financial transactions.
However, the eficacy of traditional methods relying on blacklisted numbers has waned due to
advancements in Voice-over-Internet Protocol (VoIP) technology.
      </p>
      <p>
        Alternative approaches have been explored for vishing detection. Brabin and Bojjagani
        <xref ref-type="bibr" rid="ref11 ref14">(Brabin and Bojjagani 2023)</xref>
        introduced a mechanism employing a Central Banking Server as
an Authentication Server alongside a nationwide unique phone number. This authentication
mechanism aims to validate phone numbers’ authenticity and mitigate vishing attacks. Through
simulation and analysis using Scyther, a protocol verification tool, the authors demonstrated
that their mechanism ofers enhanced protection against vishing attacks. Dissanayake et al.
        <xref ref-type="bibr" rid="ref3">(Dissanayake et al. 2023)</xref>
        proposed a system leveraging third-party threat intelligence services to
assess the reputation of suspicious artifacts in call conversations. It also utilizes natural language
processing (NLP) and ML techniques to examine the content of voice calls, identifying suspicious
elements such as phishing keywords, sensitive information, and contextual cues. Boussougou
and Park
        <xref ref-type="bibr" rid="ref11 ref14">(Moussavou Boussougou and Park 2023)</xref>
        introduced an artificial neural network
architecture for detecting Korean vishing attacks. This model integrates a 1-dimensional CNN,
a Bidirectional Long Short-Term Memory, and Hierarchical Attention Networks to efectively
extract and learn features from word embedding vectors. Furthermore, the model incorporates
attention mechanisms to emphasize crucial features, thereby enhancing detection performance.
      </p>
      <p>
        Given the rapidity of vishing occurrences, real-time detection has become a paramount
area of research. Song et al.
        <xref ref-type="bibr" rid="ref18">(Song, Kim, and Gkelias 2014)</xref>
        pioneered the iVisher approach,
employing Session Initiation Protocol-based (SIP) VoIP to authenticate caller IDs and combat
spoofing attempts in real-time. Despite its reliance on user responsiveness and organizational
cooperation, iVisher enhances telephone communication security by ensuring the consistency
between displayed names and actual caller IDs. Similarly, Kang et al.
        <xref ref-type="bibr" rid="ref9">(Kang et al. 2022)</xref>
        introduced DeepDetection, utilizing autoencoders for two-fold authentication against vishing while
preserving privacy through local voice data preprocessing. Yoon et al.
        <xref ref-type="bibr" rid="ref23">(Yoon and Choi 2022)</xref>
        proposed a federated learning-based approach, prioritizing user data privacy while improving
detection accuracy. Despite its emphasis on privacy preservation, their study primarily focuses
on the accuracy of detection algorithms, leaving room for comprehensive evaluation using
additional performance metrics. Zhao et al.
        <xref ref-type="bibr" rid="ref25">(Zhao et al. 2018)</xref>
        proposed an Android application
that utilizes NLP techniques and ML algorithms for dynamic call content analysis, while Kale
et al.
        <xref ref-type="bibr" rid="ref8">(Kale et al. 2021)</xref>
        employed Naive Bayes and CNN algorithms to classify fraudulent calls
based on conversation transcripts’ intent. Finally, Lee and Park
        <xref ref-type="bibr" rid="ref11 ref14">(Lee and Park 2023)</xref>
        proposed a
real-time vishing detection system tailored specifically for the Korean language. Through the
utilization of fundamental ML models and the transformation of voice files into text using NLP
techniques, the system is capable of promptly identifying vishing attempts as they occur. The
primary emphasis lies in achieving swift detection rather than the development of intricate
models.
      </p>
      <p>While these technical solutions have significantly advanced vishing detection, it is essential to
acknowledge the significance of human-technical solutions that empower users with knowledge
and awareness (Breve, Cimino, Deufemia, et al. 2022). By equipping individuals with essential
information, human-technical solutions complement technical approaches, thereby creating a
comprehensive defense against vishing attacks.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Advancing Vishing Attack Mitigation with Large Language</title>
    </sec>
    <sec id="sec-4">
      <title>Models</title>
      <p>
        Human susceptibility to manipulation and the propensity to trust in interpersonal interactions
render individuals the weakest link within the security framework
        <xref ref-type="bibr" rid="ref15">(Pokrovskaia and Snisarenko
2017)</xref>
        . Malicious actors exploit this vulnerability to psychologically coerce individuals into
divulging confidential information or circumventing security protocols. Consequently, vishing
attacks persist despite the availability of technical solutions, highlighting the imperative of user
education and support in mitigating such threats. Cybercriminals resort to vishing attacks when
conventional methods of exploiting technical vulnerabilities are unfeasible (Aroyo et al. 2018).
Furthermore, the expeditious nature of vishing incidents has propelled real-time detection to
the forefront of research priorities within our society.
      </p>
      <p>Given the intricate and continually evolving nature of vishing attacks, LLMs play a crucial
role in supporting users during real-time interactions with potential fraudsters. Leveraging
sophisticated NLP techniques, LLMs meticulously analyze ongoing conversations, discerning
linguistic patterns indicative of vishing attempts. Through this analytical process, LLMs provide
users with personalized and contextually appropriate answers designed to thwart social
engineering attacks and diminish the likelihood of succumbing to fraudulent schemes. In contrast to
conventional defense mechanisms reliant on static rules or pattern matching, LLMs possess the
inherent capacity to adapt and evolve in response to the evolving landscape of attack techniques
and linguistic nuances. Continuously learning from new data and interactions, LLMs refine
their comprehension of vishing patterns, thereby augmenting the eficacy of their suggested
responses over time. Moreover, the real-time nature of LLM-based assistance empowers users
to make informed decisions and take measures to safeguard their personal information and
assets. Figure 1 illustrates an example workflow delineating the generation of privacy-preserved
answers. Specifically, when a fraudster solicits a user to perform an action during a phone call,
the request is submitted to an LLM for analysis. Utilizing either a speech-to-text module to
transcribe spoken language into text or a multimodal model capable of handling voice data
directly, the pipeline initiates iterative interaction between the user and the LLM to identify
potential vishing attack risks associated with the fraudster’s request. Upon detection of a data
leakage risk, the user seeks recommendations on crafting a response conducive to preserving
privacy while gathering information about the attacker. Subsequently, the generated response
is relayed to the fraudster, with the user awaiting their subsequent move.</p>
      <p>
        An approach for implementing the iterative interaction between the user and the LLM is
referred to as Iterative Refinement
        <xref ref-type="bibr" rid="ref4">(Feng et al. 2023)</xref>
        . This approach aims to iteratively generate
new prompts, which serve as formal instructions for engaging with the LLM, based on the model
outputs. Starting with the initial output, the model systematically refines its predictions over
successive iterations. Alternatively, a predetermined set of prompts can be crafted following
the principles of the Manual Template Engineering approach
        <xref ref-type="bibr" rid="ref12">(Liu et al. 2023)</xref>
        , wherein domain
Privacy-preserved
      </p>
      <p>answer
Fraudster</p>
      <p>Fraudulent
request</p>
      <p>User
LLM
experts analyze the task at hand and manually devise prompts for interacting with the LLM.
For example, in the context of mitigating a vishing attack, it may prove beneficial to employ
three prompts:
() soliciting the model’s analysis of the risk posed by a request,
() requesting guidance on handling the request, and
() seeking advice on obtaining information about the fraudster.</p>
      <p>
        The assessment of risk inherent in a fraudulent request holds paramount significance. It
is imperative to meticulously inform users about potential risks and, in instances of extreme
severity, to intervene judiciously to preemptively mitigate any potential harm. However, a
critical consideration lies in minimizing user involvement throughout the iterative process.
Users should primarily focus on avoiding repercussions from attempted vishing attacks, without
becoming unduly preoccupied with the intricacies of LLM interaction. Hence, careful attention
must be directed towards disseminating knowledge to users efectively. In this regard, the
utilization of intelligent multimodal interfaces may prove invaluable in facilitating the
interpretation of LLM outputs and expediting the process of formulating answers
        <xref ref-type="bibr" rid="ref1 ref22">(Ahmad et al. 2024;
Wang et al. 2024)</xref>
        . For instance, LLMs may generate multiple alternative recommendations
on how to respond to a fraudulent request, and users may find it cumbersome to sift through
lengthy responses presented in a raw format. Consequently, it is essential to ensure that the
LLM’s response is concise, considering that the user is engaged in a phone call. To enhance this
capability, LLMs can be fine-tuned on datasets specific to privacy and cybersecurity contexts
        <xref ref-type="bibr" rid="ref23">(Breve, Cimino, and Deufemia 2022)</xref>
        . This fine-tuning process improves their ability to produce
contextually appropriate and precise responses. Lastly, given the user’s limited attention and
the real-time nature of the interaction, the LLM’s recommendations should be succinct and to
the point, allowing the user to quickly grasp the necessary information without disrupting the
ongoing conversation. Therefore, the paramount importance lies in efectively communicating
the recommendations of the LLM.
      </p>
      <p>Evaluating the proposed approach for utilizing LLMs in mitigating vishing attacks necessitates
a comprehensive assessment framework that encompasses various dimensions:</p>
      <p>Accuracy. The accuracy of the LLM in identifying and responding to vishing attempts
should be rigorously evaluated through controlled experiments and real-world simulations.
This evaluation should include measures such as precision, recall, and F1-score to quantify the
model’s ability to correctly identify fraudulent requests and provide appropriate responses.</p>
      <p>Eficiency . The scalability and computational eficiency of the approach need to be assessed
to ensure its feasibility for deployment in real-time environments with large-scale usage.
Evaluating the responsiveness of the system and the latency of generating and delivering responses
in real-time is essential to ensure a seamless user experience and timely mitigation of vishing
attacks. Techniques for optimizing the computational eficiency of the LLM, such as model
compression, distributed computing, and caching strategies, should be explored and evaluated
to minimize resource consumption and improve system performance.</p>
      <p>Usability. The usability of the LLM-based system plays a crucial role in its practical
efectiveness. User acceptance and satisfaction with the system interface, as well as the clarity and
efectiveness of the generated responses, should be evaluated through user studies and feedback
sessions. Moreover, the impact of the system on users’ decision-making processes and their
ability to efectively navigate vishing scenarios should be assessed to gauge the practical utility
of the approach.</p>
      <p>Security and privacy. Beyond technical performance and usability, the security and privacy
implications of deploying an LLM-based solution for vishing mitigation must also be carefully
evaluated. Potential vulnerabilities and risks associated with the system, such as adversarial
attacks or unintended information disclosure, should be thoroughly examined and addressed to
ensure the integrity and confidentiality of user interactions.</p>
      <p>The integration of LLMs into vishing defense strategies represents a promising avenue
for bolstering user resilience and reducing susceptibility to fraudulent schemes perpetrated
over telecommunication channels. As the capabilities of LLMs continue to advance, their role
in enhancing cybersecurity measures is expected to become even more indispensable, paving
the way for a safer and more secure digital environment.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work has been supported by the Italian Ministry of University and Research (MUR) and by
the European Union - NextGenerationEU, under grant PRIN 2022 PNRR “DAMOCLES: Detection
And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES” (Grant P2022FXP5B).
Aroyo, Alexander Mois, Francesco Rea, Giulio Sandini, and Alessandra Sciutti. 2018. “Trust and
social engineering in human robot interaction: Will a robot make you disclose sensitive
information, conform to its recommendations or gamble?” IEEE Robotics and Automation
Letters 3 (4): 3701–3708.</p>
      <p>Brabin, DR Denslin, and Sriramulu Bojjagani. 2023. “A Secure Mechanism for Prevention of
Vishing Attack in Banking System.” In 2023 International Conference on Networking and
Communications (ICNWC), 1–5. IEEE.</p>
      <p>Breve, Bernardo, Gaetano Cimino, and Vincenzo Deufemia. 2022. “Identifying security and
privacy violation rules in trigger-action IoT platforms with NLP models.” IEEE Internet of
Things Journal 10 (6): 5607–5622.</p>
      <p>Breve, Bernardo, Gaetano Cimino, Vincenzo Deufemia, et al. 2022. “Towards Explainable Security
for ECA Rules.” In EMPATHY@ AVI, 26–30.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Ahmad</surname>
            , Awais, Sohail Jabbar, Sheraz Akram, Paul Anand, Umar Raza, and
            <given-names>Nuha</given-names>
          </string-name>
          <string-name>
            <surname>Alshuqayran</surname>
          </string-name>
          .
          <year>2024</year>
          . “
          <article-title>Enhancing ChatGPT's querying capability with voice-based interaction and a CNNbased impaired vision detection model</article-title>
          .” Computers, Materials and Continua.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Desman</surname>
            ,
            <given-names>Mark B.</given-names>
          </string-name>
          <year>2003</year>
          . “
          <article-title>The ten commandments of information security awareness training</article-title>
          .
          <source>” Inf. Secur. J. A Glob</source>
          .
          <year>Perspect</year>
          .
          <volume>11</volume>
          (
          <issue>6</issue>
          ):
          <fpage>39</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Dissanayake</surname>
          </string-name>
          , Dushan, Prarthana Gamage, Niroopama Kumarasinghe, and Gamage Upeksha Ganegoda.
          <year>2023</year>
          . “
          <article-title>Leveraging Artifact Reputation Analysis and Contextual Sentiment Analysis for Advanced Detection of Vishing and Smishing Attacks</article-title>
          .”
          <source>In 2023 8th International Conference on Information Technology Research (ICITR)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Feng</surname>
            , Jiazhan, Chongyang Tao, Xiubo Geng, Tao Shen, Can Xu,
            <given-names>Guodong</given-names>
          </string-name>
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>Dongyan</given-names>
          </string-name>
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>and Daxin</given-names>
          </string-name>
          <string-name>
            <surname>Jiang</surname>
          </string-name>
          .
          <year>2023</year>
          .
          <article-title>“Knowledge refinement via interaction between search engines and large language models</article-title>
          .
          <source>” arXiv preprint arXiv:2305</source>
          .
          <fpage>07402</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Heiding</surname>
          </string-name>
          , Fredrik, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, and
          <string-name>
            <surname>Peter S Park</surname>
          </string-name>
          .
          <year>2024</year>
          .
          <article-title>“Devising and detecting phishing emails using large language models</article-title>
          .” IEEE Access.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Huang</surname>
            , Linan, Shumeng Jia, Emily Balcetis, and
            <given-names>Quanyan</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
          </string-name>
          .
          <year>2022</year>
          . “
          <article-title>Advert: an adaptive and data-driven attention enhancement mechanism for phishing prevention</article-title>
          .
          <source>” IEEE Transactions on Information Forensics and Security</source>
          <volume>17</volume>
          :
          <fpage>2585</fpage>
          -
          <lpage>2597</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Jeong</surname>
          </string-name>
          , Eui-seok, and Jong-in
          <string-name>
            <surname>Lim</surname>
          </string-name>
          .
          <year>2019</year>
          .
          <article-title>“Study on intelligence (AI) detection model about telecommunication finance fraud accident</article-title>
          .
          <source>” Journal of the Korea Institute of Information Security &amp; Cryptology</source>
          <volume>29</volume>
          (
          <issue>1</issue>
          ):
          <fpage>149</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Kale</surname>
            , Neha, Shivangi Kochrekar, Rishita Mote, and
            <given-names>Surekha</given-names>
          </string-name>
          <string-name>
            <surname>Dholay</surname>
          </string-name>
          .
          <year>2021</year>
          . “
          <article-title>Classification of fraud calls by intent analysis of call transcripts</article-title>
          .”
          <source>In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Kang</surname>
            , Yeajun, Wonwoong Kim, Sejin Lim, Hyunji Kim, and
            <given-names>Hwajeong</given-names>
          </string-name>
          <string-name>
            <surname>Seo</surname>
          </string-name>
          .
          <year>2022</year>
          . “
          <article-title>DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing</article-title>
          .”
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <issue>21</issue>
          ):
          <fpage>11109</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Kävrestad</surname>
            , Joakim, and
            <given-names>Marcus</given-names>
          </string-name>
          <string-name>
            <surname>Nohlberg</surname>
          </string-name>
          .
          <year>2021</year>
          . “
          <article-title>Evaluation strategies for cybersecurity training methods: a literature review</article-title>
          .
          <source>” In Human Aspects of Information Security and Assurance: 15th IFIP WG 11</source>
          .12 International Symposium, HAISA 2021,
          <string-name>
            <given-names>Virtual</given-names>
            <surname>Event</surname>
          </string-name>
          ,
          <source>July 7-9</source>
          ,
          <year>2021</year>
          , Proceedings
          <volume>15</volume>
          ,
          <fpage>102</fpage>
          -
          <lpage>112</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Lee</surname>
            , Minyoung, and
            <given-names>Eunil</given-names>
          </string-name>
          <string-name>
            <surname>Park</surname>
          </string-name>
          .
          <year>2023</year>
          . “
          <article-title>Real-time Korean voice phishing detection based on machine learning approaches</article-title>
          .
          <source>” Journal of Ambient Intelligence and Humanized Computing</source>
          <volume>14</volume>
          (
          <issue>7</issue>
          ):
          <fpage>8173</fpage>
          -
          <lpage>8184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Liu</surname>
            , Pengfei, Weizhe Yuan, Jinlan Fu, Zhengbao Jiang, Hiroaki Hayashi, and
            <given-names>Graham</given-names>
          </string-name>
          <string-name>
            <surname>Neubig</surname>
          </string-name>
          .
          <year>2023</year>
          . “
          <article-title>Pre-train, prompt, and predict: A systematic survey of prompting methods in natural language processing</article-title>
          .
          <source>” ACM Computing Surveys</source>
          <volume>55</volume>
          (
          <issue>9</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Miramirkhani</surname>
            , Najmeh,
            <given-names>Oleksii</given-names>
          </string-name>
          <string-name>
            <surname>Starov</surname>
            , and
            <given-names>Nick</given-names>
          </string-name>
          <string-name>
            <surname>Nikiforakis</surname>
          </string-name>
          .
          <year>2016</year>
          . “
          <article-title>Dial one for scam: A largescale analysis of technical support scams</article-title>
          .
          <source>” arXiv preprint arXiv:1607</source>
          .
          <fpage>06891</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Moussavou</given-names>
            <surname>Boussougou</surname>
          </string-name>
          , Milandu Keith, and
          <string-name>
            <surname>Dong-Joo Park</surname>
          </string-name>
          .
          <year>2023</year>
          . “
          <article-title>Attention-Based 1D CNNBiLSTM Hybrid Model Enhanced with FastText Word Embedding for Korean Voice Phishing Detection</article-title>
          .
          <source>” Mathematics</source>
          <volume>11</volume>
          (
          <issue>14</issue>
          ):
          <fpage>3217</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Pokrovskaia</surname>
          </string-name>
          ,
          <string-name>
            <surname>Nadezhda</surname>
            <given-names>N</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Svetlana</surname>
            <given-names>O</given-names>
          </string-name>
          <string-name>
            <surname>Snisarenko</surname>
          </string-name>
          .
          <year>2017</year>
          . “
          <article-title>Social engineering and digital technologies for the security of the social capital'development</article-title>
          .”
          <source>In 2017 International Conference" Quality Management, Transport and Information Security, Information Technologies"(IT&amp;QM&amp;IS)</source>
          ,
          <fpage>16</fpage>
          -
          <lpage>18</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Salahdine</surname>
            , Fatima, and
            <given-names>Naima</given-names>
          </string-name>
          <string-name>
            <surname>Kaabouch</surname>
          </string-name>
          .
          <year>2019</year>
          . “
          <article-title>Social engineering attacks: A survey.” Future internet 11 (4</article-title>
          ):
          <fpage>89</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Siponen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Mikko</surname>
            <given-names>T.</given-names>
          </string-name>
          <year>2000</year>
          .
          <article-title>“A conceptual foundation for organizational information security awareness.” Information management &amp; computer security 8 (1</article-title>
          ):
          <fpage>31</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Song</surname>
            , Jaeseung, Hyoungshick Kim, and
            <given-names>Athanasios</given-names>
          </string-name>
          <string-name>
            <surname>Gkelias</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>“iVisher: Real-Time Detection of Caller ID Spoofing</article-title>
          .”
          <source>ETRI Journal</source>
          <volume>36</volume>
          (
          <issue>5</issue>
          ):
          <fpage>865</fpage>
          -
          <lpage>875</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Tran</surname>
          </string-name>
          ,
          <string-name>
            <surname>Manh-Hung</surname>
          </string-name>
          ,
          <source>Trung Ha Le Hoai, and Hyunseung Choo</source>
          .
          <year>2020</year>
          .
          <article-title>“A third-party intelligent system for preventing call phishing and message scams.” In Future Data and Security Engineering</article-title>
          . Big Data, Security and Privacy,
          <source>Smart City and Industry 4</source>
          .0 Applications: 7th International Conference, FDSE 2020,
          <string-name>
            <given-names>Quy</given-names>
            <surname>Nhon</surname>
          </string-name>
          , Vietnam,
          <source>November 25-27</source>
          ,
          <year>2020</year>
          ,
          <volume>Proceedings 7</volume>
          ,
          <fpage>486</fpage>
          -
          <lpage>492</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Tulkarm</surname>
          </string-name>
          , Palestine.
          <year>2021</year>
          .
          <article-title>“A Survey of Social Engineering Attacks: Detection and Prevention Tools</article-title>
          .
          <source>” Journal of Theoretical and Applied Information Technology</source>
          <volume>99</volume>
          (
          <issue>18</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Uddin</surname>
            ,
            <given-names>Mohammad</given-names>
          </string-name>
          <string-name>
            <surname>Amaz</surname>
          </string-name>
          , and
          <string-name>
            <surname>Iqbal H Sarker</surname>
          </string-name>
          .
          <year>2024</year>
          .
          <article-title>“An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach</article-title>
          .” arXiv preprint arXiv:
          <volume>2402</volume>
          .
          <fpage>13871</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , Jiayin, Weizhi Ma, Peijie Sun, Min Zhang, and
          <string-name>
            <surname>Jian-Yun Nie</surname>
          </string-name>
          .
          <year>2024</year>
          .
          <article-title>“Understanding User Experience in Large Language Model Interactions</article-title>
          .” arXiv preprint arXiv:
          <volume>2401</volume>
          .
          <fpage>08329</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Yoon</surname>
            ,
            <given-names>Jun</given-names>
          </string-name>
          <string-name>
            <surname>Yong</surname>
          </string-name>
          , and Bong Jun Choi.
          <year>2022</year>
          . “
          <article-title>Privacy-Friendly Phishing Attack Detection Using Personalized Federated Learning</article-title>
          .”
          <source>In International Conference on Intelligent Human Computer Interaction</source>
          ,
          <fpage>460</fpage>
          -
          <lpage>465</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Zhang</surname>
            , Ruishan, and
            <given-names>Andrei</given-names>
          </string-name>
          <string-name>
            <surname>Gurtov</surname>
          </string-name>
          .
          <year>2009</year>
          . “
          <article-title>Collaborative reputation-based voice spam filtering</article-title>
          .”
          <source>In 2009 20th International Workshop on Database and Expert Systems Application</source>
          ,
          <fpage>33</fpage>
          -
          <lpage>37</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Zhao</surname>
            , Qianqian, Kai Chen,
            <given-names>Tongxin</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Yi</given-names>
          </string-name>
          <string-name>
            <surname>Yang</surname>
            , and
            <given-names>XiaoFeng</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          .
          <year>2018</year>
          . “
          <article-title>Detecting telecommunication fraud by understanding the contents of a call</article-title>
          .
          <source>” Cybersecurity</source>
          <volume>1</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>