{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:53:54Z","timestamp":1774929234196,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825007","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"2314-2319","source":"Crossref","is-referenced-by-count":4,"title":["Generating Phishing Attacks and Novel Detection Algorithms in the Era of Large Language Models"],"prefix":"10.1109","author":[{"given":"Jeffrey","family":"Fairbanks","sequence":"first","affiliation":[{"name":"Boise State University,Boise,Idaho,USA"}]},{"given":"Edoardo","family":"Serra","sequence":"additional","affiliation":[{"name":"Boise State University,Boise,Idaho,USA"}]}],"member":"263","reference":[{"key":"ref2","journal-title":"M. istral ai: Frontier ai in your hands"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102414"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"ref6","article-title":"Yara - the pattern matching swiss knife for malware researchers (and everyone else)","author":"Alvarez","year":"2024"},{"key":"ref7","article-title":"Comparative Analysis: The increase in phishing activities","volume-title":"PhD thesis","author":"Ayiku","year":"2023"},{"key":"ref8","article-title":"Azure phi 3","author":"Azure"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2010-0371"},{"key":"ref11","first-page":"397","article-title":"Evaluating top-k selection queries","volume":"99","author":"Chaudhuri","year":"1999","journal-title":"Vldb"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref13","article-title":"Laikaboss whitepaper","author":"Corporation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13101839"},{"key":"ref16","author":"Fairbanks","year":"2024","journal-title":"Post: Email archival, processing and flagging stack for incident responders"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54827-7_8"},{"key":"ref18","article-title":"Reflexion technique","author":"Guide"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/SERIES1345"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295070"},{"key":"ref23","author":"Labonne","year":"2023","journal-title":"Spam-t5: Benchmarking large language models for few-shot email spam detection"},{"key":"ref24","volume-title":"Evolving cyber threats require greater vigilance","author":"Laboratory","year":"2023"},{"key":"ref25","volume-title":"Stressed a bit? then don\u2019t click it, cybersecurity experts advise","author":"Laboratory","year":"2023"},{"key":"ref26","volume-title":"Innovation and Partnerships Office \u2014 ipo.llnl.gov"},{"key":"ref27","author":"Madaan","year":"2023","journal-title":"Self-refine: Iterative refinement with self-feedback"},{"key":"ref28","volume-title":"New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers"},{"issue":"60","key":"ref29","first-page":"1","article-title":"Naive bayes classifiers","volume":"18","author":"Murphy","year":"2006","journal-title":"University of British Columbia"},{"key":"ref30","volume-title":"Openai official website"},{"key":"ref31","volume-title":"Using logprobs"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"ref33","volume-title":"Proofpoint threat defense"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.494"},{"key":"ref35","author":"Quinn","year":"2024","journal-title":"Applying large language model (llm) for developing cybersecurity policies to counteract spear phishing attacks on senior corporate managers"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/app10072363"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183083"},{"key":"ref38","volume-title":"Sublime security","author":"Security"},{"key":"ref39","volume-title":"Aws pricing calculator for sagemaker","author":"Services"},{"key":"ref40","volume-title":"Aws sagemaker","author":"Services"},{"key":"ref41","author":"Shinn","year":"2023","journal-title":"Reflexion: Language agents with verbal reinforcement learning"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.247"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2016.1139423"},{"key":"ref44","author":"Xie","year":"2023","journal-title":"Self-evaluation guided beam search for reasoning"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825007.pdf?arnumber=10825007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:18:43Z","timestamp":1737101923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825007","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}