{"id":"https://openalex.org/W4414663921","doi":"https://doi.org/10.1007/s43926-025-00202-9","title":"Phishing detection in IoT: an integrated CNN-LSTM framework with explainable AI and LLM-enhanced analysis","display_name":"Phishing detection in IoT: an integrated CNN-LSTM framework with explainable AI and LLM-enhanced analysis","publication_year":2025,"publication_date":"2025-09-30","ids":{"openalex":"https://openalex.org/W4414663921","doi":"https://doi.org/10.1007/s43926-025-00202-9"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00202-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00202-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00202-9.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00202-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119781758","display_name":"Sara Mohammed Alasmari","orcid":null},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sara Mohammed Alasmari","raw_affiliation_strings":["College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020556015","display_name":"Houneida Sakly","orcid":"https://orcid.org/0000-0001-8018-5129"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]},{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Houneida Sakly","raw_affiliation_strings":["Center for Research on Microelectronics and Nanotechnology (CRMN), Technopole of Sousse, Sousse, Tunisia","RIADI Laboratory, ENSI, Manouba University, Campus Universitaire de la Manouba, 2010, La Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"Center for Research on Microelectronics and Nanotechnology (CRMN), Technopole of Sousse, Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]},{"raw_affiliation_string":"RIADI Laboratory, ENSI, Manouba University, Campus Universitaire de la Manouba, 2010, La Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062918876","display_name":"Naoufel Kra\u00efem","orcid":"https://orcid.org/0000-0003-1798-2883"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]},{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Naoufel Kraiem","raw_affiliation_strings":["College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia","RIADI Laboratory, ENSI, Manouba University, Campus Universitaire de la Manouba, 2010, La Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"RIADI Laboratory, ENSI, Manouba University, Campus Universitaire de la Manouba, 2010, La Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052834415","display_name":"Ali Algarni","orcid":"https://orcid.org/0009-0002-6718-517X"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ali Algarni","raw_affiliation_strings":["College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, King Khalid University, Abha, 61413, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020556015"],"corresponding_institution_ids":["https://openalex.org/I83259278","https://openalex.org/I8636806"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":12.3112,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.98387275,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8597000241279602},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5491999983787537},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5008000135421753},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43290001153945923},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.42739999294281006},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4018999934196472}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8597000241279602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7644000053405762},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5491999983787537},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4652999937534332},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43290001153945923},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42739999294281006},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4018999934196472},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3840000033378601},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3675000071525574},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.3596999943256378},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34439998865127563},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27070000767707825},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00202-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00202-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00202-9.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9db8fe7011704db7b31bc07ff6e2447c","is_oa":true,"landing_page_url":"https://doaj.org/article/9db8fe7011704db7b31bc07ff6e2447c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-53 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00202-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00202-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00202-9.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6669793866","display_name":null,"funder_award_id":"RGP2/428/46","funder_id":"https://openalex.org/F4320324433","funder_display_name":"King Khalid University"}],"funders":[{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414663921.pdf","grobid_xml":"https://content.openalex.org/works/W4414663921.grobid-xml"},"referenced_works_count":90,"referenced_works":["https://openalex.org/W150462035","https://openalex.org/W1964126497","https://openalex.org/W2001516552","https://openalex.org/W2020648356","https://openalex.org/W2074379603","https://openalex.org/W2134750673","https://openalex.org/W2139565456","https://openalex.org/W2152394300","https://openalex.org/W2588787044","https://openalex.org/W2617978315","https://openalex.org/W2761388029","https://openalex.org/W2791951418","https://openalex.org/W2806379428","https://openalex.org/W2806697149","https://openalex.org/W2883994809","https://openalex.org/W2914801588","https://openalex.org/W2933127114","https://openalex.org/W2942475188","https://openalex.org/W2950260107","https://openalex.org/W2969671680","https://openalex.org/W2972760196","https://openalex.org/W2973862992","https://openalex.org/W2974110037","https://openalex.org/W2980576170","https://openalex.org/W2980720901","https://openalex.org/W3012111863","https://openalex.org/W3013557734","https://openalex.org/W3018464563","https://openalex.org/W3018800955","https://openalex.org/W3039598638","https://openalex.org/W3046058513","https://openalex.org/W3085804088","https://openalex.org/W3086769011","https://openalex.org/W3093981686","https://openalex.org/W3094117827","https://openalex.org/W3094291258","https://openalex.org/W3095711016","https://openalex.org/W3104525401","https://openalex.org/W3105217250","https://openalex.org/W3158216587","https://openalex.org/W3189081616","https://openalex.org/W3197388494","https://openalex.org/W3205702936","https://openalex.org/W3205880227","https://openalex.org/W3209545352","https://openalex.org/W3211681758","https://openalex.org/W3211832877","https://openalex.org/W4200224268","https://openalex.org/W4206967005","https://openalex.org/W4213166078","https://openalex.org/W4226443146","https://openalex.org/W4229336016","https://openalex.org/W4307261374","https://openalex.org/W4310043880","https://openalex.org/W4312431595","https://openalex.org/W4313196990","https://openalex.org/W4313588323","https://openalex.org/W4367056173","https://openalex.org/W4367598850","https://openalex.org/W4367856675","https://openalex.org/W4376055742","https://openalex.org/W4379382625","https://openalex.org/W4383535390","https://openalex.org/W4386002794","https://openalex.org/W4386196516","https://openalex.org/W4386363234","https://openalex.org/W4388419817","https://openalex.org/W4390944703","https://openalex.org/W4392385984","https://openalex.org/W4392889692","https://openalex.org/W4394610696","https://openalex.org/W4399338566","https://openalex.org/W4400491225","https://openalex.org/W4400574640","https://openalex.org/W4400590863","https://openalex.org/W4400728141","https://openalex.org/W4401305868","https://openalex.org/W4401485877","https://openalex.org/W4401507029","https://openalex.org/W4402534400","https://openalex.org/W4404075990","https://openalex.org/W4404569134","https://openalex.org/W4405697113","https://openalex.org/W4405975507","https://openalex.org/W4406096916","https://openalex.org/W4406320579","https://openalex.org/W4407040484","https://openalex.org/W4407217751","https://openalex.org/W4407466527","https://openalex.org/W6930114163"],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"pose":[2],"a":[3,14,37,41,49],"significant":[4],"threat":[5],"to":[6,31,112,133,138,149],"Industrial":[7],"Internet":[8],"of":[9,95,104,165],"Things":[10],"(IoT)":[11],"networks,":[12],"with":[13,64],"documented":[15],"350%":[16],"increase":[17],"in":[18],"IoT-targeted":[19],"phishing":[20,46,127],"attempts":[21],"since":[22],"2020.":[23],"This":[24,122],"alarming":[25],"trend":[26],"necessitates":[27],"robust":[28],"security":[29,120,135,155],"measures":[30,136],"protect":[32],"critical":[33],"infrastructure.":[34],"We":[35],"propose":[36],"novel":[38],"methodology":[39],"integrating":[40],"CNN-LSTM":[42,78],"model":[43,79,91],"for":[44,52,75,118],"initial":[45],"detection":[47,128],"and":[48,88,99,152],"sophisticated":[50],"LLM":[51,158],"comprehensive":[53],"analysis.":[54],"Our":[55,77],"approach":[56,123],"combines":[57],"spatial":[58],"feature":[59],"extraction":[60],"via":[61],"CNN":[62],"layers":[63],"temporal":[65],"pattern":[66],"recognition":[67],"through":[68,157],"LSTM,":[69],"enhanced":[70],"by":[71,109,146],"explainable":[72,105],"AI":[73,106],"techniques":[74],"transparency.":[76],"achieves":[80,92],"93.26%":[81],"accuracy":[82,94,129],"on":[83,97],"the":[84,89,163],"Web":[85],"URL":[86],"dataset":[87],"DistilBERT":[90],"an":[93],"98.64%":[96],"text":[98],"email":[100],"dataset.":[101],"The":[102],"addition":[103],"improves":[107,126],"transparency":[108],"41%":[110,147],"compared":[111,148],"black-box":[113],"approaches,":[114],"which":[115],"is":[116],"crucial":[117],"IoT":[119,166],"operations.":[121],"not":[124],"only":[125],"but":[130],"also":[131],"contributes":[132],"adaptive":[134],"tailored":[137],"evolving":[139],"cybersecurity":[140],"threats.":[141],"By":[142],"reducing":[143],"false":[144],"positives":[145],"traditional":[150],"methods":[151],"providing":[153],"human-interpretable":[154],"insights":[156],"integration,":[159],"our":[160],"framework":[161],"ensures":[162],"resilience":[164],"networks":[167],"while":[168],"maintaining":[169],"operational":[170],"efficiency.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
