{"id":"https://openalex.org/W4319996419","doi":"https://doi.org/10.1109/access.2023.3237798","title":"A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks","display_name":"A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4319996419","doi":"https://doi.org/10.1109/access.2023.3237798"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3237798","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3237798","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10019269.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10019269.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015182224","display_name":"Sultan Asiri","orcid":"https://orcid.org/0000-0002-7405-7646"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sultan Asiri","raw_affiliation_strings":["Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0002-7405-7646","affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046618429","display_name":"Yang Xiao","orcid":"https://orcid.org/0000-0001-8549-6794"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Xiao","raw_affiliation_strings":["Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-8549-6794","affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101498344","display_name":"Saleh Alzahrani","orcid":"https://orcid.org/0000-0001-8380-2487"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saleh Alzahrani","raw_affiliation_strings":["Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-8380-2487","affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386530","display_name":"Shuhui Li","orcid":"https://orcid.org/0000-0001-6754-8976"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuhui Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-6754-8976","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025349097","display_name":"Tieshan Li","orcid":"https://orcid.org/0000-0003-0474-953X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tieshan Li","raw_affiliation_strings":["School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China","Navigation College, Dalian Maritime University, Dalian, Gaoxinyuan, China"],"raw_orcid":"https://orcid.org/0000-0003-0474-953X","affiliations":[{"raw_affiliation_string":"School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Navigation College, Dalian Maritime University, Dalian, Gaoxinyuan, China","institution_ids":["https://openalex.org/I43313876"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015182224"],"corresponding_institution_ids":["https://openalex.org/I17301866"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":43.0954,"has_fulltext":true,"cited_by_count":97,"citation_normalized_percentile":{"value":0.99869258,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"6421","last_page":"6443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9710725545883179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8083223700523376},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.6246063709259033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5376227498054504},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5002200603485107},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.48948729038238525},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4821555018424988},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.4791806936264038},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.45113450288772583},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39111408591270447},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.37260597944259644}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9710725545883179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8083223700523376},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.6246063709259033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5376227498054504},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5002200603485107},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48948729038238525},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4821555018424988},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.4791806936264038},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.45113450288772583},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39111408591270447},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.37260597944259644}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3237798","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3237798","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10019269.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dbdb924ee5ee44d0893feacc11fdee3c","is_oa":true,"landing_page_url":"https://doaj.org/article/dbdb924ee5ee44d0893feacc11fdee3c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 6421-6443 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3237798","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3237798","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10019269.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1888148865","display_name":null,"funder_award_id":"61976033","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5139682657","display_name":null,"funder_award_id":"51939001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4319996419.pdf","grobid_xml":"https://content.openalex.org/works/W4319996419.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W1486818322","https://openalex.org/W1924770834","https://openalex.org/W1985920648","https://openalex.org/W2052427829","https://openalex.org/W2064675550","https://openalex.org/W2109255472","https://openalex.org/W2128084896","https://openalex.org/W2131846894","https://openalex.org/W2132314437","https://openalex.org/W2167634085","https://openalex.org/W2563351168","https://openalex.org/W2625935159","https://openalex.org/W2754252319","https://openalex.org/W2783819197","https://openalex.org/W2787538540","https://openalex.org/W2884745705","https://openalex.org/W2896457183","https://openalex.org/W2913334908","https://openalex.org/W2923014022","https://openalex.org/W2944103016","https://openalex.org/W2948344613","https://openalex.org/W2952142850","https://openalex.org/W2953343412","https://openalex.org/W2953664229","https://openalex.org/W2954932437","https://openalex.org/W2978733081","https://openalex.org/W2980427366","https://openalex.org/W2982523005","https://openalex.org/W3003048870","https://openalex.org/W3015534721","https://openalex.org/W3018198392","https://openalex.org/W3022651159","https://openalex.org/W3037276035","https://openalex.org/W3046679246","https://openalex.org/W3085804088","https://openalex.org/W3089043621","https://openalex.org/W3093549234","https://openalex.org/W3093641884","https://openalex.org/W3094117827","https://openalex.org/W3111551806","https://openalex.org/W3113075730","https://openalex.org/W3116066219","https://openalex.org/W3118329104","https://openalex.org/W3134999560","https://openalex.org/W3151417188","https://openalex.org/W3169092194","https://openalex.org/W3176551042","https://openalex.org/W3179968378","https://openalex.org/W3182823491","https://openalex.org/W3195446130","https://openalex.org/W4206706469","https://openalex.org/W4213081600","https://openalex.org/W4230906748","https://openalex.org/W4234078321","https://openalex.org/W4238848851","https://openalex.org/W4240381657","https://openalex.org/W4245264547","https://openalex.org/W4251748000","https://openalex.org/W4285247275","https://openalex.org/W4294170691","https://openalex.org/W6640212811","https://openalex.org/W6679728998","https://openalex.org/W6731031554","https://openalex.org/W6748384357","https://openalex.org/W6755207826"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W199254545","https://openalex.org/W2997836625","https://openalex.org/W4252285266","https://openalex.org/W4244102749","https://openalex.org/W2476504758","https://openalex.org/W111175386","https://openalex.org/W4248464163","https://openalex.org/W1937580673","https://openalex.org/W4361023959"],"abstract_inverted_index":{"Phishing":[0,35],"attacks":[1,19,36,109,147,165],"are":[2,47],"a":[3,55,62,68,78,86],"type":[4],"of":[5,16,116],"cybercrime":[6],"that":[7,58,72,89],"has":[8],"grown":[9],"in":[10,166],"recent":[11],"years.":[12],"It":[13],"is":[14,130],"part":[15],"social":[17,30],"engineering":[18],"where":[20],"an":[21,74],"attacker":[22],"deceives":[23],"users":[24],"by":[25],"sending":[26],"fake":[27,87],"messages":[28],"using":[29],"media":[31],"platforms":[32],"or":[33,40],"emails.":[34],"steal":[37],"users\u2019":[38],"information":[39],"download":[41],"and":[42,100,124,144,148,162,181],"install":[43],"malicious":[44],"software.":[45],"They":[46],"hard":[48],"to":[49,61,85,103,106,134,159],"detect":[50,107,160],"because":[51],"attackers":[52],"can":[53,76],"design":[54],"phishing":[56,69,108,126,146,164],"message":[57,65],"looks":[59],"legitimate":[60],"user.":[63],"This":[64,80],"may":[66],"contain":[67],"URL":[70,81,145],"so":[71],"even":[73],"expert":[75],"be":[77],"victim.":[79],"leads":[82],"the":[83,111,114,153],"victim":[84],"website":[88],"steals":[90],"information,":[91,95,97],"such":[92],"as":[93],"login":[94],"payment":[96],"etc.":[98],"Researchers":[99],"engineers":[101],"work":[102],"develop":[104],"methods":[105],"without":[110],"need":[112],"for":[113],"eyes":[115],"experts.":[117],"Even":[118],"though":[119],"many":[120],"papers":[121],"discuss":[122,135],"HTML":[123,143],"URL-based":[125,161],"detection":[127,149],"methods,":[128],"there":[129],"no":[131],"comprehensive":[132],"survey":[133],"these":[136],"methods.":[137,150],"Therefore,":[138],"this":[139],"paper":[140],"comprehensively":[141],"surveys":[142],"We":[151,168],"review":[152],"current":[154],"state-of-art":[155],"deep":[156],"learning":[157],"models":[158],"hybrid-based":[163],"detail.":[167],"compare":[169],"each":[170],"model":[171,179],"based":[172],"on":[173],"its":[174],"data":[175],"preprocessing,":[176],"feature":[177],"extraction,":[178],"design,":[180],"performance.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":37},{"year":2024,"cited_by_count":35},{"year":2023,"cited_by_count":16}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
