{"id":"https://openalex.org/W7115931317","doi":"https://doi.org/10.1007/s10791-025-09849-y","title":"Human in the loop reinforcement learning framework for adaptive phishing detection","display_name":"Human in the loop reinforcement learning framework for adaptive phishing detection","publication_year":2025,"publication_date":"2025-12-18","ids":{"openalex":"https://openalex.org/W7115931317","doi":"https://doi.org/10.1007/s10791-025-09849-y"},"language":"en","primary_location":{"id":"doi:10.1007/s10791-025-09849-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09849-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09849-y.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09849-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sohail Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I125656591","display_name":"Effat University","ror":"https://ror.org/02cnwgt19","country_code":"SA","type":"education","lineage":["https://openalex.org/I125656591"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sohail Khan","raw_affiliation_strings":["Department of Computer Science, Effat College of Engineering, Effat University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Effat College of Engineering, Effat University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I125656591"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I125656591"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.75146228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8331999778747559,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8331999778747559,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.01119999960064888,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.746999979019165},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7444999814033508},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7131999731063843},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4625000059604645},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4129999876022339},{"id":"https://openalex.org/keywords/adaptive-behavior","display_name":"Adaptive behavior","score":0.37380000948905945},{"id":"https://openalex.org/keywords/human-behavior","display_name":"Human behavior","score":0.3573000133037567},{"id":"https://openalex.org/keywords/human-in-the-loop","display_name":"Human-in-the-loop","score":0.3538999855518341},{"id":"https://openalex.org/keywords/adaptive-learning","display_name":"Adaptive learning","score":0.3474999964237213}],"concepts":[{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.746999979019165},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7444999814033508},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7131999731063843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6791999936103821},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5408999919891357},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5054000020027161},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4625000059604645},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4129999876022339},{"id":"https://openalex.org/C68784500","wikidata":"https://www.wikidata.org/wiki/Q1570691","display_name":"Adaptive behavior","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C117035363","wikidata":"https://www.wikidata.org/wiki/Q3769299","display_name":"Human behavior","level":2,"score":0.3573000133037567},{"id":"https://openalex.org/C2780626000","wikidata":"https://www.wikidata.org/wiki/Q5936775","display_name":"Human-in-the-loop","level":2,"score":0.3538999855518341},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C199190896","wikidata":"https://www.wikidata.org/wiki/Q3509276","display_name":"Learning classifier system","level":3,"score":0.32280001044273376},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C67203356","wikidata":"https://www.wikidata.org/wiki/Q1321905","display_name":"Reinforcement","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.290800005197525},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C186886427","wikidata":"https://www.wikidata.org/wiki/Q5441213","display_name":"Feedback loop","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27070000767707825},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26190000772476196},{"id":"https://openalex.org/C184670325","wikidata":"https://www.wikidata.org/wiki/Q512604","display_name":"Loop (graph theory)","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.25589999556541443},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.2547000050544739}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10791-025-09849-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09849-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09849-y.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:58bb1ef4a7424ac4ac7bfa3ad98f72f4","is_oa":true,"landing_page_url":"https://doaj.org/article/58bb1ef4a7424ac4ac7bfa3ad98f72f4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Computing, Vol 28, Iss 1, Pp 1-21 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s10791-025-09849-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09849-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09849-y.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W7115931317.pdf"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W2131600418","https://openalex.org/W2154023516","https://openalex.org/W2783033852","https://openalex.org/W2958447199","https://openalex.org/W3022956672","https://openalex.org/W3091958244","https://openalex.org/W3100366369","https://openalex.org/W3108270739","https://openalex.org/W3119847909","https://openalex.org/W3120672518","https://openalex.org/W3133843004","https://openalex.org/W3156295478","https://openalex.org/W3194593788","https://openalex.org/W4210494767","https://openalex.org/W4214938478","https://openalex.org/W4224220194","https://openalex.org/W4226300618","https://openalex.org/W4252939763","https://openalex.org/W4282920965","https://openalex.org/W4296717257","https://openalex.org/W4313387916","https://openalex.org/W4318312487","https://openalex.org/W4321392130","https://openalex.org/W4380082195","https://openalex.org/W4383671701","https://openalex.org/W4385276622","https://openalex.org/W4386903112","https://openalex.org/W4387826905","https://openalex.org/W4388579564","https://openalex.org/W4388853806","https://openalex.org/W4392908117","https://openalex.org/W4393160410","https://openalex.org/W4398152829","https://openalex.org/W4403360640","https://openalex.org/W4405654320","https://openalex.org/W4406267208","https://openalex.org/W4409561124","https://openalex.org/W4410319648","https://openalex.org/W4413928475"],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"remain":[2],"a":[3,112],"persistent":[4],"threat":[5],"in":[6],"cybersecurity,":[7],"exploiting":[8],"human":[9,56],"psychology":[10],"to":[11,58,81],"extract":[12],"confidential":[13],"information.":[14],"Conventional":[15],"machine":[16],"learning":[17],"and":[18,34,85,121],"Reinforcement":[19,48],"Learning":[20],"(RL)":[21],"approaches":[22],"often":[23],"rely":[24],"on":[25,97],"rigid":[26],"binary":[27],"reward":[28,63],"structures":[29],"that":[30,54,104],"oversimplify":[31],"phishing":[32,83,126],"behavior":[33],"demand":[35],"extensive":[36],"datasets,":[37],"limiting":[38],"their":[39],"practical":[40],"deployment.":[41],"This":[42],"paper":[43],"presents":[44],"HARE":[45,72,105],"(Human-guided":[46],"Adaptive":[47],"for":[49,124],"Engineering),":[50],"an":[51,107],"RL-based":[52],"framework":[53],"integrates":[55],"feedback":[57],"adaptively":[59],"shape":[60],"the":[61,98],"agent\u2019s":[62],"signal.":[64],"By":[65],"incorporating":[66],"scalar,":[67],"context-aware":[68],"guidance":[69],"from":[70],"experts,":[71],"enables":[73],"faster":[74],"convergence":[75],"with":[76,111],"fewer":[77],"samples,":[78],"improves":[79],"adaptability":[80],"evolving":[82],"tactics,":[84],"captures":[86],"subtle":[87],"behavioral":[88],"cues":[89],"frequently":[90],"missed":[91],"by":[92],"automated":[93],"detectors.":[94],"Experimental":[95],"evaluation":[96],"publicly":[99],"available":[100],"PhiUSIIL":[101],"dataset":[102],"shows":[103],"achieves":[106],"F1-score":[108],"of":[109,116],"97.62%":[110],"false":[113],"positive":[114],"rate":[115],"2.55%,":[117],"confirming":[118],"its":[119],"reliability":[120],"data":[122],"efficiency":[123],"adaptive":[125],"detection.":[127]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-12-19T00:00:00"}
