
tional Journal of Advanced Trends in Computer Sci-
ence and Engineering, 9(3).
Alabdan, R. (2020). Phishing attacks survey: Types,
vectors, and technical approaches. Future internet,
12(10):168.
Allodi, L., Chotza, T., Panina, E., and Zannone, N.
(2019). The need for new antiphishing measures
against spear-phishing attacks. IEEE Security & Pri-
vacy, 18(2):23–34.
Althamary, I. A. and El-Alfy, E.-S. M. (2017). A more se-
cure scheme for captcha-based authentication in cloud
environment. In 2017 8th International Conference
on Information Technology (ICIT), pages 405–411.
IEEE.
Antonopoulos, N. and Gillam, L. (2010). Cloud computing,
volume 51. Springer.
Balani, Z. and Varol, H. (2020). Cloud computing security
challenges and threats. In 2020 8th International Sym-
posium on Digital Forensics and Security (ISDFS),
pages 1–4. IEEE.
Butt, U. A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B.,
and Ahmadian, A. (2023). Cloud-based email phish-
ing attack using machine and deep learning algorithm.
Complex & Intelligent Systems, 9(3):3043–3070.
Chandra, J. V., Challa, N., and Pasupuleti, S. K. (2015).
Intelligence based defense system to protect from ad-
vanced persistent threat by means of social engineer-
ing on social cloud platform. Indian Journal of Sci-
ence and Technology.
Chaudhry, J. A., Chaudhry, S. A., and Rittenhouse, R. G.
(2016). Phishing attacks and defenses. International
journal of security and its applications, 10(1):247–
256.
Chiew, K. L., Yong, K. S. C., and Tan, C. L. (2018). A
survey of phishing attacks: Their types, vectors and
technical approaches. Expert Systems with Applica-
tions, 106:1–20.
Denscombe, M. (2017). The good research guide: For
small-scale social research projects. McGraw-Hill
Education (UK).
Filipe, J. and Obaidat, M. S. (2009). E-business
and Telecommunications: International Conference,
ICETE 2008, Porto, Portugal, July 26-29, 2008, Re-
vised Selected Papers, volume 48. Springer Science
& Business Media.
Goel, S., Williams, K., and Dincelli, E. (2017). Got
phished? internet security and human vulnerability.
Journal of the Association for Information Systems,
18(1):2.
Goyal, S. (2014). Public vs private vs hybrid vs community-
cloud computing: a critical review. International
Journal of Computer Network and Information Secu-
rity, 6(3):20–29.
Gutierrez, C. N., Kim, T., Della Corte, R., Avery, J., Gold-
wasser, D., Cinque, M., and Bagchi, S. (2018). Learn-
ing from the ones that got away: Detecting new forms
of phishing attacks. IEEE Transactions on Depend-
able and Secure Computing, 15(6):988–1001.
Humayun, M., Niazi, M., Almufareh, M. F., Jhanjhi, N.,
Mahmood, S., and Alshayeb, M. (2022). Software-
as-a-service security challenges and best practices:
A multivocal literature review. Applied Sciences,
12(8):3953.
Jha, B., Atre, M., and Rao, A. (2022). Detecting cloud-
based phishing attacks by combining deep learning
models. In 2022 IEEE 4th International Conference
on Trust, Privacy and Security in Intelligent Systems,
and Applications (TPS-ISA), pages 130–139. IEEE.
Johannesson, P. and Perjons, E. (2014). An introduction to
design science, volume 10. Springer.
Karthika, R., Valliyammai, C., and Naveena, M. (2023).
Phish block: A blockchain framework for phish de-
tection in cloud. Computer Systems Science & Engi-
neering, 44(1).
Kitchenham, B., Charters, S., et al. (2007). Guidelines for
performing systematic literature reviews in software
engineering version 2.3. Engineering, 45(4ve):1051.
Loxdal, J., Andersson, M., Hacks, S., and Lagerstr
¨
om, R.
(2021). Why phishing works on smartphones: A pre-
liminary study. In 54th Annual Hawaii International
Conference on System Sciences, HICSS 2021, pages
7173–7182. ScholarSpace.
Prasad, V. K., Dansana, D., Mishra, B. K., and Bhavsar, M.
(2022). Intensify cloud security and privacy against
phishing attacks. ECS Transactions, 107(1):1387.
Preethi, P., Ramadevi, P., Akshaya, K., Sangamitra, S., and
Pritikha, A. (2023). Analysis of phishing attack in
distributed cloud systems using machine learning. In
2023 Second International Conference on Electrical,
Electronics, Information and Communication Tech-
nologies (ICEEICT), pages 1–5. IEEE.
Rakotondravony, N., Taubmann, B., Mandarawi, W.,
Weish
¨
aupl, E., Xu, P., Kolosnjaji, B., Protsenko, M.,
De Meer, H., and Reiser, H. P. (2017). Classifying
malware attacks in iaas cloud environments. Journal
of Cloud Computing, 6:1–12.
Shaikh, A. N., Shabut, A. M., and Hossain, M. A. (2016). A
literature review on phishing crime, prevention review
and investigation of gaps. In 2016 10th international
conference on software, knowledge, information man-
agement & applications (SKIMA), pages 9–15. IEEE.
Surbiryala, J. and Rong, C. (2019). Cloud computing: His-
tory and overview. In 2019 IEEE Cloud Summit, pages
1–7. IEEE.
Tripathy, D., Gohil, R., and Halabi, T. (2020). Detect-
ing sql injection attacks in cloud saas using machine
learning. In 2020 IEEE 6th Intl Conference on Big
Data Security on Cloud (BigDataSecurity), IEEE Intl
Conference on High Performance and Smart Comput-
ing,(HPSC) and IEEE Intl Conference on Intelligent
Data and Security (IDS), pages 145–150. IEEE.
Vayansky, I. and Kumar, S. (2018). Phishing–challenges
and solutions. Computer Fraud & Security,
2018(1):15–20.
Wu, W., Hu, S., Yang, X., Liu, J. K., and Au, M. H.
(2017). Towards secure and cost-effective fuzzy ac-
cess control in mobile cloud computing. Soft Comput-
ing, 21:2643–2649.
Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?
241