<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Gaetano</forename><surname>Cimino</surname></persName>
							<email>g.cimino@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">University of Salerno</orgName>
								<orgName type="institution" key="instit2">via Giovanni Paolo II</orgName>
								<address>
									<addrLine>Fisciano (SA)</addrLine>
									<postCode>84084</postCode>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vincenzo</forename><surname>Deufemia</surname></persName>
							<email>deufemia@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">University of Salerno</orgName>
								<orgName type="institution" key="instit2">via Giovanni Paolo II</orgName>
								<address>
									<addrLine>Fisciano (SA)</addrLine>
									<postCode>84084</postCode>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">4FAB65D91E969AEA48E7689341846AA3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Vishing attacks, a prevalent manifestation of social engineering, exploit human trust and manipulation over phone calls to illicitly obtain sensitive information. As these attacks evolve in sophistication, traditional defense mechanisms struggle to maintain efficacy, necessitating the exploration of alternative solutions. In this context, Large Language Models (LLMs) emerge as a cornerstone for fortifying defenses against vishing attacks. Through harnessing the profound linguistic knowledge embedded within LLMs, there exists the potential to comprehensively analyze conversations, identify subtle indicators characteristic of vishing, and dynamically generate adaptive countermeasures in real-time. This position paper underscores the promising role of LLMs in enhancing cybersecurity defenses against vishing, thereby laying the groundwork for further exploration and advancement in this critical domain.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With the exponential advancement of communication technologies, the landscape of fraudulent activities has evolved, presenting new challenges for cybersecurity. One such challenge is the rise of vishing, a form of social engineering where attackers manipulate individuals into divulging sensitive information over the phone under false pretenses <ref type="bibr" target="#b19">(Salahdine and Kaabouch 2019;</ref><ref type="bibr" target="#b23">Tulkarm 2021)</ref>. According to statistics provided by the Federal Trade Commission, during the sole year of 2020, there were over 128,000 occurrences of fraudulent schemes perpetrated through telephone communications, culminating in a significant financial detriment amounting to $108 million for the victims involved 1 . Vishing, derived from "voice" and "phishing", exploits human psychology and trust, making it a valuable tool for cybercriminals to exploit vulnerabilities in individuals and organizations alike. This trend has been further magnified by the widespread adoption of remote work and virtual interactions on a global scale, particularly accelerated by events such as the COVID-19 pandemic, which has created a fertile environment for the proliferation of vishing attacks. As individuals increasingly rely on digital communication channels for work, socializing, and commerce, they become more susceptible to manipulation and deception over the phone. The absence of visual cues in telephonic conversations exacerbates this vulnerability, as individuals are forced to rely solely on auditory cues and verbal interactions to assess the authenticity of the caller. Furthermore, vishing attacks often target specific Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance demographics or industries, exploiting social or cultural norms to increase their effectiveness. For example, attackers may leverage knowledge obtained from social media or data breaches to personalize their attacks, enhancing their credibility and persuasiveness. Alternatively, they may impersonate trusted authority figures, such as bank representatives or government officials, to instill a sense of urgency or fear in their targets. An illustration of such a scenario was documented by The Wall Street Journal, wherein a vishing attack led to the CEO of a British energy company transferring $243,000 to the bank account of an assailant under the erroneous belief that he was engaged in a legitimate conversation with his superior<ref type="foot" target="#foot_0">2</ref> . Traditional defense mechanisms, such as spam filters and blacklisting <ref type="bibr" target="#b16">(Miramirkhani, Starov, and Nikiforakis 2016)</ref>, are proving inadequate in light of evolving attack tactics and the sheer volume of fraudulent calls. Therefore, in response to the escalating threat posed by vishing attacks, cybersecurity researchers and practitioners are exploring innovative detection approaches <ref type="bibr" target="#b6">(Dissanayake et al. 2023;</ref><ref type="bibr" target="#b17">Moussavou Boussougou and Park 2023;</ref><ref type="bibr" target="#b14">Lee and Park 2023)</ref>. While technical solutions can effectively support users in detecting vishing attacks, they may not impart users with the knowledge necessary to enhance their accuracy in recognizing vishing attempts <ref type="bibr" target="#b9">(Huang et al. 2022)</ref>. Indeed, users must be equipped to comprehend the consequences of their actions and learn to engage in more secure practices <ref type="bibr" target="#b5">(Desman 2003)</ref>. Concerning this matter, there has been a rapid proliferation of security and awareness training initiatives <ref type="bibr" target="#b20">(Siponen 2000;</ref><ref type="bibr" target="#b13">Kävrestad and Nohlberg 2021)</ref>, which aim to educate users on what actions to take, why they are necessary, and how to execute them. This shift towards the development of human-technical solutions involves the generation of adaptive aids in real-time to prevent users from inadvertently falling victim to social engineering attacks and reduce their susceptibility <ref type="bibr" target="#b9">(Huang et al. 2022)</ref>. In this context, Large Language Models (LLMs) possess the potential to serve as an effective tool for mitigating vishing. By leveraging LLMs to analyze conversations and detect linguistic patterns indicative of attack attempts, the aim is to equip individuals and organizations with timely guidance against social engineering attacks (Uddin and Sarker 2024; <ref type="bibr" target="#b8">Heiding et al. 2024)</ref>. Moreover, the iterative nature of LLM-based approaches enables continuous learning and adaptation to new attack vectors, enhancing their effectiveness in dynamic threat environments.</p><p>This position paper seeks to explore the intersection of vishing attacks, communication technologies, and LLM-based mitigation strategies, with a focus on developing an approach to address the evolving challenges posed by vishing attacks, ultimately enhancing the resilience of individuals and organizations against fraudulent activities perpetrated over telecommunication channels.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>In the early stages of vishing detection, the strategy of phone blacklisting emerged as a prevalent method. This entailed the compilation of databases containing identified scam numbers, typically sourced from user submissions. Tran et al. <ref type="bibr" target="#b22">(Tran, Hoai, and Choo 2020)</ref> delved into this technique further, exploring a blacklisting and whitelisting-based detection approach through their iCaMs system. This system utilizes machine learning (ML) for validating phone numbers within a Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance client-server architecture. Similarly, Zhang and Gurtov <ref type="bibr" target="#b27">(Zhang and Gurtov 2009</ref>) proposed a detection system that relies on recipient whitelists to establish connections with callers.</p><p>Jeong and Lim (Jeong and Lim 2019) addressed vishing through an intelligence-based detection model, which integrates blacklisting-based and scenario-based rule models with convolutional neural networks (CNNs) to enhance the accuracy of detecting abnormal financial transactions. However, the efficacy of traditional methods relying on blacklisted numbers has waned due to advancements in Voice-over-Internet Protocol (VoIP) technology.</p><p>Alternative approaches have been explored for vishing detection. Brabin and Bojjagani (Brabin and Bojjagani 2023) introduced a mechanism employing a Central Banking Server as an Authentication Server alongside a nationwide unique phone number. This authentication mechanism aims to validate phone numbers' authenticity and mitigate vishing attacks. Through simulation and analysis using Scyther, a protocol verification tool, the authors demonstrated that their mechanism offers enhanced protection against vishing attacks. Dissanayake et al. <ref type="bibr" target="#b6">(Dissanayake et al. 2023)</ref> proposed a system leveraging third-party threat intelligence services to assess the reputation of suspicious artifacts in call conversations. It also utilizes natural language processing (NLP) and ML techniques to examine the content of voice calls, identifying suspicious elements such as phishing keywords, sensitive information, and contextual cues. Boussougou and Park (Moussavou Boussougou and Park 2023) introduced an artificial neural network architecture for detecting Korean vishing attacks. This model integrates a 1-dimensional CNN, a Bidirectional Long Short-Term Memory, and Hierarchical Attention Networks to effectively extract and learn features from word embedding vectors. Furthermore, the model incorporates attention mechanisms to emphasize crucial features, thereby enhancing detection performance.</p><p>Given the rapidity of vishing occurrences, real-time detection has become a paramount area of research. Song et al. <ref type="bibr" target="#b21">(Song, Kim, and Gkelias 2014)</ref> pioneered the iVisher approach, employing Session Initiation Protocol-based (SIP) VoIP to authenticate caller IDs and combat spoofing attempts in real-time. Despite its reliance on user responsiveness and organizational cooperation, iVisher enhances telephone communication security by ensuring the consistency between displayed names and actual caller IDs. Similarly, Kang et al. <ref type="bibr" target="#b12">(Kang et al. 2022</ref>) introduced DeepDetection, utilizing autoencoders for two-fold authentication against vishing while preserving privacy through local voice data preprocessing. Yoon et al. <ref type="bibr" target="#b26">(Yoon and Choi 2022)</ref> proposed a federated learning-based approach, prioritizing user data privacy while improving detection accuracy. Despite its emphasis on privacy preservation, their study primarily focuses on the accuracy of detection algorithms, leaving room for comprehensive evaluation using additional performance metrics. Zhao et al. <ref type="bibr" target="#b28">(Zhao et al. 2018)</ref> proposed an Android application that utilizes NLP techniques and ML algorithms for dynamic call content analysis, while Kale et al. <ref type="bibr" target="#b11">(Kale et al. 2021</ref>) employed Naive Bayes and CNN algorithms to classify fraudulent calls based on conversation transcripts' intent. Finally, Lee and Park (Lee and Park 2023) proposed a real-time vishing detection system tailored specifically for the Korean language. Through the utilization of fundamental ML models and the transformation of voice files into text using NLP techniques, the system is capable of promptly identifying vishing attempts as they occur. The primary emphasis lies in achieving swift detection rather than the development of intricate models.</p><p>While these technical solutions have significantly advanced vishing detection, it is essential to acknowledge the significance of human-technical solutions that empower users with knowledge and awareness <ref type="bibr">(Breve, Cimino, Deufemia, et al. 2022)</ref>. By equipping individuals with essential information, human-technical solutions complement technical approaches, thereby creating a comprehensive defense against vishing attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Advancing Vishing Attack Mitigation with Large Language Models</head><p>Human susceptibility to manipulation and the propensity to trust in interpersonal interactions render individuals the weakest link within the security framework <ref type="bibr" target="#b18">(Pokrovskaia and Snisarenko 2017)</ref>. Malicious actors exploit this vulnerability to psychologically coerce individuals into divulging confidential information or circumventing security protocols. Consequently, vishing attacks persist despite the availability of technical solutions, highlighting the imperative of user education and support in mitigating such threats. Cybercriminals resort to vishing attacks when conventional methods of exploiting technical vulnerabilities are unfeasible <ref type="bibr" target="#b1">(Aroyo et al. 2018)</ref>.</p><p>Furthermore, the expeditious nature of vishing incidents has propelled real-time detection to the forefront of research priorities within our society.</p><p>Given the intricate and continually evolving nature of vishing attacks, LLMs play a crucial role in supporting users during real-time interactions with potential fraudsters. Leveraging sophisticated NLP techniques, LLMs meticulously analyze ongoing conversations, discerning linguistic patterns indicative of vishing attempts. Through this analytical process, LLMs provide users with personalized and contextually appropriate answers designed to thwart social engineering attacks and diminish the likelihood of succumbing to fraudulent schemes. In contrast to conventional defense mechanisms reliant on static rules or pattern matching, LLMs possess the inherent capacity to adapt and evolve in response to the evolving landscape of attack techniques and linguistic nuances. Continuously learning from new data and interactions, LLMs refine their comprehension of vishing patterns, thereby augmenting the efficacy of their suggested responses over time. Moreover, the real-time nature of LLM-based assistance empowers users to make informed decisions and take measures to safeguard their personal information and assets. Figure <ref type="figure" target="#fig_0">1</ref> illustrates an example workflow delineating the generation of privacy-preserved answers. Specifically, when a fraudster solicits a user to perform an action during a phone call, the request is submitted to an LLM for analysis. Utilizing either a speech-to-text module to transcribe spoken language into text or a multimodal model capable of handling voice data directly, the pipeline initiates iterative interaction between the user and the LLM to identify potential vishing attack risks associated with the fraudster's request. Upon detection of a data leakage risk, the user seeks recommendations on crafting a response conducive to preserving privacy while gathering information about the attacker. Subsequently, the generated response is relayed to the fraudster, with the user awaiting their subsequent move.</p><p>An approach for implementing the iterative interaction between the user and the LLM is referred to as Iterative Refinement <ref type="bibr" target="#b7">(Feng et al. 2023)</ref>. This approach aims to iteratively generate new prompts, which serve as formal instructions for engaging with the LLM, based on the model outputs. Starting with the initial output, the model systematically refines its predictions over successive iterations. Alternatively, a predetermined set of prompts can be crafted following the principles of the Manual Template Engineering approach <ref type="bibr" target="#b15">(Liu et al. 2023)</ref>, wherein domain experts analyze the task at hand and manually devise prompts for interacting with the LLM. For example, in the context of mitigating a vishing attack, it may prove beneficial to employ three prompts:</p><p>(𝑖) soliciting the model's analysis of the risk posed by a request, (𝑖𝑖) requesting guidance on handling the request, and (𝑖𝑖𝑖) seeking advice on obtaining information about the fraudster.</p><p>The assessment of risk inherent in a fraudulent request holds paramount significance. It is imperative to meticulously inform users about potential risks and, in instances of extreme severity, to intervene judiciously to preemptively mitigate any potential harm. However, a critical consideration lies in minimizing user involvement throughout the iterative process. Users should primarily focus on avoiding repercussions from attempted vishing attacks, without becoming unduly preoccupied with the intricacies of LLM interaction. Hence, careful attention must be directed towards disseminating knowledge to users effectively. In this regard, the utilization of intelligent multimodal interfaces may prove invaluable in facilitating the interpretation of LLM outputs and expediting the process of formulating answers <ref type="bibr" target="#b0">(Ahmad et al. 2024;</ref><ref type="bibr" target="#b25">Wang et al. 2024)</ref>. For instance, LLMs may generate multiple alternative recommendations on how to respond to a fraudulent request, and users may find it cumbersome to sift through lengthy responses presented in a raw format. Consequently, it is essential to ensure that the LLM's response is concise, considering that the user is engaged in a phone call. To enhance this capability, LLMs can be fine-tuned on datasets specific to privacy and cybersecurity contexts <ref type="bibr">(Breve, Cimino, and Deufemia 2022)</ref>. This fine-tuning process improves their ability to produce contextually appropriate and precise responses. Lastly, given the user's limited attention and the real-time nature of the interaction, the LLM's recommendations should be succinct and to the point, allowing the user to quickly grasp the necessary information without disrupting the ongoing conversation. Therefore, the paramount importance lies in effectively communicating the recommendations of the LLM.</p><p>Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance</p><p>Evaluating the proposed approach for utilizing LLMs in mitigating vishing attacks necessitates a comprehensive assessment framework that encompasses various dimensions:</p><p>Accuracy. The accuracy of the LLM in identifying and responding to vishing attempts should be rigorously evaluated through controlled experiments and real-world simulations. This evaluation should include measures such as precision, recall, and F1-score to quantify the model's ability to correctly identify fraudulent requests and provide appropriate responses.</p><p>Efficiency. The scalability and computational efficiency of the approach need to be assessed to ensure its feasibility for deployment in real-time environments with large-scale usage. Evaluating the responsiveness of the system and the latency of generating and delivering responses in real-time is essential to ensure a seamless user experience and timely mitigation of vishing attacks. Techniques for optimizing the computational efficiency of the LLM, such as model compression, distributed computing, and caching strategies, should be explored and evaluated to minimize resource consumption and improve system performance.</p><p>Usability. The usability of the LLM-based system plays a crucial role in its practical effectiveness. User acceptance and satisfaction with the system interface, as well as the clarity and effectiveness of the generated responses, should be evaluated through user studies and feedback sessions. Moreover, the impact of the system on users' decision-making processes and their ability to effectively navigate vishing scenarios should be assessed to gauge the practical utility of the approach.</p><p>Security and privacy. Beyond technical performance and usability, the security and privacy implications of deploying an LLM-based solution for vishing mitigation must also be carefully evaluated. Potential vulnerabilities and risks associated with the system, such as adversarial attacks or unintended information disclosure, should be thoroughly examined and addressed to ensure the integrity and confidentiality of user interactions.</p><p>The integration of LLMs into vishing defense strategies represents a promising avenue for bolstering user resilience and reducing susceptibility to fraudulent schemes perpetrated over telecommunication channels. As the capabilities of LLMs continue to advance, their role in enhancing cybersecurity measures is expected to become even more indispensable, paving the way for a safer and more secure digital environment.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: An illustration of the workflow utilized for generating privacy-preserved answers leveraging outputs from an LLM.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been supported by the Italian Ministry of University and Research (MUR) and by the European Union -NextGenerationEU, under grant PRIN 2022 PNRR "DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES" (Grant P2022FXP5B).</p></div>
			</div>


			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>(V. Deufemia) 0000-0001-8061-7104 (G. Cimino); 0000-0002-6711-3590 (V. Deufemia) 1 https://blog.knowbe4.com/vishing-attacks-yield-phone-fraud-take-of-over-100-million</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Enhancing ChatGPT&apos;s querying capability with voice-based interaction and a CNNbased impaired vision detection model</title>
		<author>
			<persName><forename type="first">Awais</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sohail</forename><surname>Jabbar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sheraz</forename><surname>Akram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paul</forename><surname>Anand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Umar</forename><surname>Raza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nuha</forename><surname>Alshuqayran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers, Materials and Continua</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Trust and social engineering in human robot interaction: Will a robot make you disclose sensitive information, conform to its recommendations or gamble?</title>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Aroyo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Francesco</forename><surname>Mois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giulio</forename><surname>Rea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alessandra</forename><surname>Sandini</surname></persName>
		</author>
		<author>
			<persName><surname>Sciutti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Robotics and Automation Letters</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="3701" to="3708" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Secure Mechanism for Prevention of Vishing Attack in Banking System</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Brabin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sriramulu</forename><surname>Denslin</surname></persName>
		</author>
		<author>
			<persName><surname>Bojjagani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2023 International Conference on Networking and Communications (ICNWC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Identifying security and privacy violation rules in trigger-action IoT platforms with NLP models</title>
		<author>
			<persName><forename type="first">Bernardo</forename><surname>Breve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gaetano</forename><surname>Cimino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincenzo</forename><surname>Deufemia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="5607" to="5622" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Towards Explainable Security for ECA Rules</title>
		<author>
			<persName><forename type="first">Bernardo</forename><surname>Breve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gaetano</forename><surname>Cimino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincenzo</forename><surname>Deufemia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EMPATHY@ AVI</title>
		<imprint>
			<biblScope unit="page" from="26" to="30" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The ten commandments of information security awareness training</title>
		<author>
			<persName><forename type="first">Mark</forename><forename type="middle">B</forename><surname>Desman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Secur. J. A Glob. Perspect</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="39" to="44" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Leveraging Artifact Reputation Analysis and Contextual Sentiment Analysis for Advanced Detection of Vishing and Smishing Attacks</title>
		<author>
			<persName><forename type="first">Dushan</forename><surname>Dissanayake</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Prarthana</forename><surname>Gamage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Niroopama</forename><surname>Kumarasinghe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gamage Upeksha</forename><surname>Ganegoda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on Information Technology Research (ICITR)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Knowledge refinement via interaction between search engines and large language models</title>
		<author>
			<persName><forename type="first">Jiazhan</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chongyang</forename><surname>Tao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Xiubo</forename><surname>Geng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tao</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Can</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Guodong</forename><surname>Long</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dongyan</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daxin</forename><surname>Jiang</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2305.07402</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Devising and detecting phishing emails using large language models</title>
		<author>
			<persName><forename type="first">Fredrik</forename><surname>Heiding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Schneier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arun</forename><surname>Vishwanath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeremy</forename><surname>Bernstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><forename type="middle">S</forename><surname>Park</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Advert: an adaptive and data-driven attention enhancement mechanism for phishing prevention</title>
		<author>
			<persName><forename type="first">Linan</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shumeng</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Emily</forename><surname>Balcetis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Quanyan</forename><surname>Zhu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics and Security</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="2585" to="2597" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Study on intelligence (AI) detection model about telecommunication finance fraud accident</title>
		<author>
			<persName><forename type="first">Eui-Seok</forename><surname>Jeong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jong-In</forename><surname>Lim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Korea Institute of Information Security &amp; Cryptology</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="149" to="164" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Classification of fraud calls by intent analysis of call transcripts</title>
		<author>
			<persName><forename type="first">Neha</forename><surname>Kale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shivangi</forename><surname>Kochrekar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rishita</forename><surname>Mote</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Surekha</forename><surname>Dholay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12th International Conference on Computing Communication and Networking Technologies (ICCCNT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">DeepDetection: Privacy-Enhanced Deep Voice Detection and User Authentication for Preventing Voice Phishing</title>
		<author>
			<persName><forename type="first">Yeajun</forename><surname>Kang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wonwoong</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sejin</forename><surname>Lim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hyunji</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hwajeong</forename><surname>Seo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Towards Enhanced Human Mitigation of Vishing Attacks: Leveraging Large Language Models for Real-Time User Guidance</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page">11109</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Evaluation strategies for cybersecurity training methods: a literature review</title>
		<author>
			<persName><forename type="first">Joakim</forename><surname>Kävrestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcus</forename><surname>Nohlberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event</title>
		<title level="s">Proceedings</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021-07-07">2021. July 7-9, 2021</date>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="102" to="112" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Real-time Korean voice phishing detection based on machine learning approaches</title>
		<author>
			<persName><forename type="first">Minyoung</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eunil</forename><surname>Park</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Ambient Intelligence and Humanized Computing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="8173" to="8184" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Pre-train, prompt, and predict: A systematic survey of prompting methods in natural language processing</title>
		<author>
			<persName><forename type="first">Pengfei</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Weizhe</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jinlan</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zhengbao</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hiroaki</forename><surname>Hayashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Graham</forename><surname>Neubig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="1" to="35" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Dial one for scam: A largescale analysis of technical support scams</title>
		<author>
			<persName><forename type="first">Najmeh</forename><surname>Miramirkhani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Oleksii</forename><surname>Starov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nick</forename><surname>Nikiforakis</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1607.06891</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Attention-Based 1D CNN-BiLSTM Hybrid Model Enhanced with FastText Word Embedding for Korean Voice Phishing Detection</title>
		<author>
			<persName><forename type="first">Moussavou</forename><surname>Boussougou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Milandu</forename><surname>Keith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dong-Joo</forename><surname>Park</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematics</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">14</biblScope>
			<biblScope unit="page">3217</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Social engineering and digital technologies for the security of the social capital&apos;development</title>
		<author>
			<persName><surname>Pokrovskaia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Nadezhda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Svetlana</forename><forename type="middle">O</forename><surname>Snisarenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference&quot; Quality Management, Transport and Information Security, Information Technologies</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="16" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Social engineering attacks: A survey</title>
		<author>
			<persName><forename type="first">Fatima</forename><surname>Salahdine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Naima</forename><surname>Kaabouch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future internet</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">89</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A conceptual foundation for organizational information security awareness</title>
		<author>
			<persName><forename type="first">Mikko</forename><forename type="middle">T</forename><surname>Siponen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information management &amp; computer security</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="31" to="41" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">iVisher: Real-Time Detection of Caller ID Spoofing</title>
		<author>
			<persName><forename type="first">Jaeseung</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hyoungshick</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Athanasios</forename><surname>Gkelias</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ETRI Journal</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="865" to="875" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A third-party intelligent system for preventing call phishing and message scams</title>
		<author>
			<persName><forename type="first">Manh-</forename><surname>Tran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Trung</forename><surname>Hung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Le</forename><surname>Ha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hyunseung</forename><surname>Hoai</surname></persName>
		</author>
		<author>
			<persName><surname>Choo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications: 7th International Conference, FDSE 2020</title>
		<title level="s">Proceedings</title>
		<meeting><address><addrLine>Quy Nhon, Vietnam</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020-11-25">2020. November 25-27, 2020</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="486" to="492" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">A Survey of Social Engineering Attacks: Detection and Prevention Tools</title>
		<author>
			<persName><forename type="first">Palestine</forename><surname>Tulkarm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Theoretical and Applied Information Technology</title>
		<imprint>
			<biblScope unit="volume">99</biblScope>
			<biblScope unit="issue">18</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach</title>
		<author>
			<persName><forename type="first">Mohammad</forename><surname>Uddin</surname></persName>
		</author>
		<author>
			<persName><surname>Amaz</surname></persName>
		</author>
		<author>
			<persName><surname>Sarker</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2402.13871</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Understanding User Experience in Large Language Model Interactions</title>
		<author>
			<persName><forename type="first">Jiayin</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Weizhi</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peijie</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Min</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jian-Yun</forename><surname>Nie</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2401.08329</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Privacy-Friendly Phishing Attack Detection Using Personalized Federated Learning</title>
		<author>
			<persName><forename type="first">Jun</forename><surname>Yoon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bong</forename><forename type="middle">Jun</forename><surname>Yong</surname></persName>
		</author>
		<author>
			<persName><surname>Choi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Intelligent Human Computer Interaction</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="460" to="465" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Collaborative reputation-based voice spam filtering</title>
		<author>
			<persName><forename type="first">Ruishan</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Gurtov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">20th International Workshop on Database and Expert Systems Application</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="33" to="37" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Detecting telecommunication fraud by understanding the contents of a call</title>
		<author>
			<persName><forename type="first">Qianqian</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kai</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tongxin</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yi</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Xiaofeng</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
