{"id":"https://openalex.org/W2605432626","doi":"https://doi.org/10.1093/comjnl/bxx035","title":"Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering","display_name":"Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W2605432626","doi":"https://doi.org/10.1093/comjnl/bxx035","mag":"2605432626"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxx035","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx035","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M El-Alfy","raw_affiliation_strings":["Information and Computer Science Department, College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":10.6398,"has_fulltext":false,"cited_by_count":58,"citation_normalized_percentile":{"value":0.98202399,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"60","issue":"12","first_page":"1745","last_page":"1759"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9328678846359253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081461787223816},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6783400774002075},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6245976686477661},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6230447292327881},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5493995547294617},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5290438532829285},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4555578827857971},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4324619770050049},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4151982367038727},{"id":"https://openalex.org/keywords/medoid","display_name":"Medoid","score":0.41388195753097534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3488372564315796},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1759289801120758},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08989423513412476}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9328678846359253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081461787223816},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6783400774002075},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6245976686477661},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6230447292327881},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5493995547294617},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5290438532829285},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4555578827857971},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4324619770050049},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4151982367038727},{"id":"https://openalex.org/C63085389","wikidata":"https://www.wikidata.org/wiki/Q4287912","display_name":"Medoid","level":3,"score":0.41388195753097534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3488372564315796},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1759289801120758},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08989423513412476},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxx035","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxx035","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1136330450","https://openalex.org/W1540089290","https://openalex.org/W1568881000","https://openalex.org/W1704387297","https://openalex.org/W1863383349","https://openalex.org/W1964168965","https://openalex.org/W1970174926","https://openalex.org/W2002356434","https://openalex.org/W2004417280","https://openalex.org/W2028223155","https://openalex.org/W2029470356","https://openalex.org/W2037021247","https://openalex.org/W2083620785","https://openalex.org/W2113449956","https://openalex.org/W2129393269","https://openalex.org/W2141667975","https://openalex.org/W2144405005","https://openalex.org/W2278316643","https://openalex.org/W2293701763","https://openalex.org/W2310347995","https://openalex.org/W2394007963","https://openalex.org/W2480729267","https://openalex.org/W2999729612"],"related_works":["https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W1981963489","https://openalex.org/W67347563","https://openalex.org/W2765340726","https://openalex.org/W2121587354","https://openalex.org/W4250020282","https://openalex.org/W2080177354","https://openalex.org/W2137279730"],"abstract_inverted_index":{"With":[0],"the":[1,59,61,73,101,114,119,122,165],"increasing":[2],"rate":[3],"and":[4,31,43,72,145,159],"catastrophic":[5],"consequences":[6],"of":[7,63,103,121,141],"phishing":[8,65,90,144],"attacks,":[9],"research":[10],"on":[11,93,134],"anti-phishing":[12],"solutions":[13,47],"has":[14],"gained":[15],"growing":[16],"importance":[17],"in":[18,58,164],"information":[19,25],"security.":[20],"Security":[21],"risks":[22],"may":[23],"include":[24],"leakage,":[26],"identity":[27],"theft,":[28],"financial":[29],"loss":[30],"reputation":[32],"sabotage.":[33],"Raising":[34],"human":[35],"awareness":[36],"is":[37,48,68],"not":[38],"a":[39,49,69,77,85,135],"sufficient":[40],"mitigation":[41],"method":[42],"deploying":[44],"complementary":[45],"technical":[46],"crucial":[50],"requirement.":[51],"Although":[52],"various":[53,131],"approaches":[54],"have":[55],"been":[56],"proposed":[57,123],"literature,":[60],"design":[62],"efficient":[64],"detection":[66,115],"models":[67,155],"challenging":[70],"task":[71],"problem":[74],"still":[75],"lacks":[76],"complete":[78],"solution.":[79],"In":[80],"this":[81],"paper,":[82],"we":[83,125],"present":[84],"novel":[86],"approach":[87],"for":[88],"detecting":[89],"websites":[91],"based":[92],"probabilistic":[94],"neural":[95],"networks":[96],"(PNNs).":[97],"We":[98],"also":[99],"investigate":[100],"integration":[102],"PNN":[104],"with":[105,161,172],"K-medoids":[106],"clustering":[107],"to":[108,129],"significantly":[109],"reduce":[110],"complexity":[111],"without":[112],"jeopardizing":[113],"accuracy.":[116],"To":[117],"assess":[118],"feasibility":[120],"approach,":[124],"conducted":[126],"in-depth":[127],"study":[128],"evaluate":[130],"performance":[132],"measures":[133],"publicly":[136],"available":[137],"data":[138],"set":[139],"composed":[140],"11":[142],"055":[143],"benign":[146],"websites.":[147],"The":[148],"experimental":[149],"results":[150],"show":[151],"that":[152],"more":[153],"accurate":[154],"can":[156,169],"be":[157,170],"built":[158],"even":[160],">40%":[162],"reduction":[163],"complexity,":[166],">97%":[167],"accuracy":[168],"achieved":[171],"low":[173],"false":[174],"errors.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
