INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue VI, June 2025
www.ijltemas.in Page 401
review, empirical threat databases, and platform evaluation offers a novel reference model for researchers, cybersecurity
educators, and policymakers focused on digital safety and online privacy.
References
1. Adebowale, M. A., Mbarika, V., & Solomon, A. (2021). Examining users’ cybersecurity awareness in developing
nations. Cybersecurity, 4(1), 1–13. https://doi.org/10.1186/s42400-021-00075-9
2. Ahmed, M., Quadri, S. M. K., & Shaikh, A. (2022). Intelligent threat intelligence platform for real-time malware
detection. Computer Standards & Interfaces, 79, 103567. https://doi.org/10.1016/j.csi.2021.103567
3. Ali, W., Abbas, Q., & Nazir, B. (2020). Security challenges in the IoT-based web environment: A survey. Computer
Networks, 179, 107376. https://doi.org/10.1016/j.comnet.2020.107376
4. Alotaibi, M., & Furnell, S. (2020). A study of end-user awareness and perception of cybersecurity threats. Information &
Computer Security, 28(4), 539–556. https://doi.org/10.1108/ICS-11-2019-0134
5. Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2020). A survey on advanced persistent threats: Techniques,
solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials, 21(2), 1851–1877.
https://doi.org/10.1109/COMST.2019.2957221
6. Amin, R., Singh, P. K., & Ghrera, S. P. (2021). Malware analysis and detection in cyber-physical systems using threat
intelligence. Journal of Ambient Intelligence and Humanized Computing, 12, 3895–3911.
https://doi.org/10.1007/s12652-020-02406-w
7. Chen, J., Chen, X., Lin, Y., & Lee, C. (2021). An efficient threat intelligence sharing mechanism for detecting malicious
URLs. Journal of Information Security and Applications, 58, 102787. https://doi.org/10.1016/j.jisa.2021.102787
8. Choudhary, S., Kumar, R., & Tapaswi, S. (2019). Real-time phishing detection using URL and domain-based features.
Procedia Computer Science, 167, 870–879. https://doi.org/10.1016/j.procs.2020.03.407
9. Google Transparency Report. (2023). Safe browsing site status. https://transparencyreport.google.com/safe-browsing
10. Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2018). Fighting against phishing attacks: State of the art and
future challenges. Neural Computing and Applications, 28, 3629–3654. https://doi.org/10.1007/s00521-016-2275-y
11. Kaspersky. (2022). Kaspersky Security Bulletin: Statistics of 2022. https://securelist.com/kaspersky-statistics-report-
2022/
12. Liu, J., Qiu, M., & Yuan, Y. (2022). Deep learning-based phishing URL detection using real-time threat intelligence.
Journal of Intelligent & Fuzzy Systems, 42(2), 1989–2001. https://doi.org/10.3233/JIFS-211057
13. Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009). Beyond blacklists: Learning to detect malicious web sites from
suspicious URLs. Proceedings of the 15th ACM SIGKDD, 1245–1254. https://doi.org/10.1145/1557019.1557141
14. Mahmoudi, M., Javadi, H. H. S., & Ghaffari, A. (2020). Malware analysis based on file behavior using machine
learning. Procedia Computer Science, 177, 377–384. https://doi.org/10.1016/j.procs.2020.10.054
15. Peng, Y., Wang, Y., & Zhang, X. (2021). Analyzing the effectiveness of browser-based security extensions. Computers
& Security, 102, 102113. https://doi.org/10.1016/j.cose.2020.102113
16. Rao, U. P., & Nayak, S. (2018). Application of machine learning in detecting malicious URLs. Procedia Computer
Science, 132, 824–831. https://doi.org/10.1016/j.procs.2018.05.139
17. Sahoo, B. P., Panda, S. N., & Tripathy, S. (2021). Artificial intelligence-based framework for detecting phishing
websites. Journal of King Saud University – Computer and Information Sciences, 33(6), 714–721.
https://doi.org/10.1016/j.jksuci.2019.05.004
18. Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning-based phishing detection from URLs. Expert
Systems with Applications, 117, 345–357. https://doi.org/10.1016/j.eswa.2018.09.029
19. Tan, Z., Ma, J., & Wu, J. (2020). An experimental study on ad blocker effectiveness. IEEE Access, 8, 209434–209448.
https://doi.org/10.1109/ACCESS.2020.3038707
20. Wang, H., Zeng, L., & Yang, G. (2022). Mobile malware detection using permission-based features and ensemble
learning. Future Generation Computer Systems, 127, 387–396. https://doi.org/10.1016/j.future.2021.08.007
21. Wu, Y., & Liu, X. (2022). Detecting malicious domains with DNS traffic analysis using attention-based neural networks.
Computers & Security, 111, 102497. https://doi.org/10.1016/j.cose.2021.102497
22. Xie, J., Li, Y., & Wang, J. (2021). Deep detection of malware distribution via illegal software websites. Journal of
Cybersecurity and Privacy, 1(4), 645–663. https://doi.org/10.3390/jcp1040035
23. Zhao, W., Zhang, L., & Zhou, Q. (2020). Detecting malicious domains through DNS data and graph-based machine
learning. IEEE Access, 8, 163597–163608. https://doi.org/10.1109/ACCESS.2020.3021414