{"id":"https://openalex.org/W4323065767","doi":"https://doi.org/10.1109/access.2023.3252366","title":"Phishing Detection System Through Hybrid Machine Learning Based on URL","display_name":"Phishing Detection System Through Hybrid Machine Learning Based on URL","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4323065767","doi":"https://doi.org/10.1109/access.2023.3252366"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3252366","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3252366","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10058201.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10058201.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080335473","display_name":"Abdul Karim","orcid":"https://orcid.org/0000-0003-2190-7210"},"institutions":[{"id":"https://openalex.org/I165230279","display_name":"Universitas Gadjah Mada","ror":"https://ror.org/03ke6d638","country_code":"ID","type":"education","lineage":["https://openalex.org/I165230279"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Abdul Karim","raw_affiliation_strings":["Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia"],"raw_orcid":"https://orcid.org/0000-0003-2190-7210","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia","institution_ids":["https://openalex.org/I165230279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005623740","display_name":"Mobeen Shahroz","orcid":"https://orcid.org/0000-0003-1170-6335"},"institutions":[{"id":"https://openalex.org/I174731842","display_name":"Islamia University of Bahawalpur","ror":"https://ror.org/002rc4w13","country_code":"PK","type":"education","lineage":["https://openalex.org/I174731842"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mobeen Shahroz","raw_affiliation_strings":["Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur, Punjab, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-1170-6335","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur, Punjab, Pakistan","institution_ids":["https://openalex.org/I174731842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072284220","display_name":"Khabib Mustofa","orcid":"https://orcid.org/0000-0002-8659-8677"},"institutions":[{"id":"https://openalex.org/I165230279","display_name":"Universitas Gadjah Mada","ror":"https://ror.org/03ke6d638","country_code":"ID","type":"education","lineage":["https://openalex.org/I165230279"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Khabib Mustofa","raw_affiliation_strings":["Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia"],"raw_orcid":"https://orcid.org/0000-0002-8659-8677","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia","institution_ids":["https://openalex.org/I165230279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053691175","display_name":"Samir Brahim Belhaouari","orcid":"https://orcid.org/0000-0003-2336-0490"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Samir Brahim Belhaouari","raw_affiliation_strings":["Division of Information and Computer Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0003-2336-0490","affiliations":[{"raw_affiliation_string":"Division of Information and Computer Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012633197","display_name":"S Ramana Kumar Joga","orcid":"https://orcid.org/0000-0001-5458-3852"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Ramana Kumar Joga","raw_affiliation_strings":["Dadi Institute of Engineering and Technology, Anakapalle, Andhra Pradesh, India"],"raw_orcid":"https://orcid.org/0000-0001-5458-3852","affiliations":[{"raw_affiliation_string":"Dadi Institute of Engineering and Technology, Anakapalle, Andhra Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080335473"],"corresponding_institution_ids":["https://openalex.org/I165230279"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":93.7436,"has_fulltext":true,"cited_by_count":211,"citation_normalized_percentile":{"value":0.99979032,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"36805","last_page":"36822"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9062764644622803},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8253383636474609},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7227229475975037},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6773872971534729},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6706147789955139},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6694116592407227},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6664836406707764},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6094411015510559},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4910256862640381},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3952317535877228},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3615613281726837},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1111074686050415}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9062764644622803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253383636474609},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7227229475975037},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6773872971534729},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6706147789955139},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6694116592407227},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6664836406707764},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6094411015510559},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4910256862640381},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3952317535877228},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3615613281726837},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1111074686050415}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2023.3252366","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3252366","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10058201.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8e35118926534d6d9ce94cd61f3994b9","is_oa":true,"landing_page_url":"https://doaj.org/article/8e35118926534d6d9ce94cd61f3994b9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 36805-36822 (2023)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/26796208","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Phishing_Detection_System_Through_Hybrid_Machine_Learning_Based_on_URL/26796208","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3252366","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3252366","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10058201.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4323065767.pdf","grobid_xml":"https://content.openalex.org/works/W4323065767.grobid-xml"},"referenced_works_count":75,"referenced_works":["https://openalex.org/W1560206005","https://openalex.org/W1618905105","https://openalex.org/W1924689489","https://openalex.org/W1985920648","https://openalex.org/W1990188874","https://openalex.org/W2023973750","https://openalex.org/W2028223155","https://openalex.org/W2029470356","https://openalex.org/W2031062495","https://openalex.org/W2031254140","https://openalex.org/W2038269916","https://openalex.org/W2052427829","https://openalex.org/W2060654449","https://openalex.org/W2065584379","https://openalex.org/W2072981546","https://openalex.org/W2096762731","https://openalex.org/W2110952687","https://openalex.org/W2112716550","https://openalex.org/W2118020653","https://openalex.org/W2121082043","https://openalex.org/W2139565456","https://openalex.org/W2162532690","https://openalex.org/W2361517492","https://openalex.org/W2407354681","https://openalex.org/W2417999172","https://openalex.org/W2418966180","https://openalex.org/W2565439473","https://openalex.org/W2617978315","https://openalex.org/W2739066632","https://openalex.org/W2740589650","https://openalex.org/W2766955736","https://openalex.org/W2779627157","https://openalex.org/W2780954022","https://openalex.org/W2782171552","https://openalex.org/W2783033852","https://openalex.org/W2788346622","https://openalex.org/W2792144656","https://openalex.org/W2797672282","https://openalex.org/W2800226301","https://openalex.org/W2801494564","https://openalex.org/W2802855132","https://openalex.org/W2805162503","https://openalex.org/W2890718808","https://openalex.org/W2896234982","https://openalex.org/W2901744059","https://openalex.org/W2908786285","https://openalex.org/W2911964244","https://openalex.org/W2912009511","https://openalex.org/W2914801588","https://openalex.org/W2944103016","https://openalex.org/W2964978809","https://openalex.org/W2980872583","https://openalex.org/W2982294134","https://openalex.org/W2982624015","https://openalex.org/W3003545752","https://openalex.org/W3088020913","https://openalex.org/W3088469008","https://openalex.org/W3110742137","https://openalex.org/W3200190150","https://openalex.org/W3207470445","https://openalex.org/W4212883601","https://openalex.org/W4220702949","https://openalex.org/W4254077482","https://openalex.org/W4283703245","https://openalex.org/W4285172164","https://openalex.org/W4292913661","https://openalex.org/W4307812418","https://openalex.org/W6636501900","https://openalex.org/W6684212199","https://openalex.org/W6686499196","https://openalex.org/W6687403153","https://openalex.org/W6704198774","https://openalex.org/W6741613141","https://openalex.org/W6794959624","https://openalex.org/W6840553280"],"related_works":["https://openalex.org/W2782609208","https://openalex.org/W3088188605","https://openalex.org/W4367336074","https://openalex.org/W4379620016","https://openalex.org/W3154045278","https://openalex.org/W3210764983","https://openalex.org/W4367335949","https://openalex.org/W3089416646","https://openalex.org/W4380048833","https://openalex.org/W4285162676"],"abstract_inverted_index":{"Currently,":[0],"numerous":[1],"types":[2],"of":[3,73,120,195,267,272],"cybercrime":[4,33],"are":[5,235],"organized":[6],"through":[7],"the":[8,28,35,54,68,108,114,153,244,254,263,268,273,278,282,287],"internet.":[9,36],"Hence,":[10],"this":[11],"study":[12,104,156],"mainly":[13],"focuses":[14],"on":[15,34,67,107],"phishing":[16,19,74,100,109,121,147,213],"attacks.":[17,101],"Although":[18],"was":[20],"first":[21],"used":[22,236],"in":[23,59,95,131],"1996,":[24],"it":[25],"has":[26],"become":[27],"most":[29],"severe":[30],"and":[31,71,82,122,143,149,186,201,207,218,229,259,265,285],"dangerous":[32],"Phishing":[37],"utilizes":[38],"email":[39],"distortion":[40],"as":[41,162,253],"its":[42],"underlying":[43],"mechanism":[44],"for":[45,85],"tricky":[46],"correspondences,":[47],"followed":[48],"by":[49],"mock":[50],"sites,":[51],"to":[52,145,152,210,242,261],"obtain":[53],"required":[55],"data":[56],"from":[57,113,127],"people":[58],"question.":[60],"Different":[61],"studies":[62],"have":[63,140],"presented":[64],"their":[65],"work":[66],"precaution,":[69],"identification,":[70],"knowledge":[72],"attacks;":[75],"however,":[76],"there":[77],"is":[78,105,192],"currently":[79],"no":[80],"complete":[81],"proper":[83],"solution":[84],"frustrating":[86],"them.":[87],"Therefore,":[88],"machine":[89,137,158],"learning":[90,138,159],"plays":[91],"a":[92,193],"vital":[93],"role":[94],"defending":[96],"against":[97,212],"cybercrimes":[98],"involving":[99],"The":[102,220,270],"proposed":[103,187,238,245,279],"based":[106],"URL-based":[110],"dataset":[111,116],"extracted":[112],"famous":[115],"repository,":[117],"which":[118,191],"consists":[119],"legitimate":[123],"URL":[124],"attributes":[125],"collected":[126],"11000+":[128],"website":[129],"datasets":[130],"vector":[132,183,199],"form.":[133],"After":[134],"preprocessing,":[135],"many":[136],"algorithms":[139],"been":[141],"applied":[142],"designed":[144],"prevent":[146],"URLs":[148],"provide":[150],"protection":[151],"user.":[154],"This":[155],"uses":[157],"models":[160,284],"such":[161,252],"decision":[163,202],"tree":[164,203],"(DT),":[165],"linear":[166],"regression":[167],"(LR),":[168],"random":[169],"forest":[170],"(RF),":[171],"naive":[172],"Bayes":[173],"(NB),":[174],"gradient":[175],"boosting":[176],"classifier":[177,180,184],"(GBM),":[178],"K-neighbors":[179],"(KNN),":[181],"support":[182,198],"(SVC),":[185],"hybrid":[188],"LSD":[189,239],"model,":[190],"combination":[194],"logistic":[196],"regression,":[197],"machine,":[200],"(LR+SVC+DT)":[204],"with":[205,215,225,237],"soft":[206],"hard":[208],"voting,":[209],"defend":[211],"attacks":[214],"high":[216],"accuracy":[217],"efficiency.":[219],"canopy":[221],"feature":[222],"selection":[223],"technique":[224],"cross":[226],"fold":[227],"valoidation":[228],"Grid":[230],"Search":[231],"Hyperparameter":[232],"Optimization":[233],"techniques":[234],"model.":[240],"Furthermore,":[241],"evaluate":[243],"approach,":[246],"different":[247],"evaluation":[248],"parameters":[249],"were":[250],"adopted,":[251],"precision,":[255],"accuracy,":[256],"recall,":[257],"F1-score,":[258],"specificity,":[260],"illustrate":[262],"effects":[264],"efficiency":[266],"models.":[269],"results":[271],"comparative":[274],"analyses":[275],"demonstrate":[276],"that":[277],"approach":[280],"outperforms":[281],"other":[283],"achieves":[286],"best":[288],"results.":[289]},"counts_by_year":[{"year":2026,"cited_by_count":27},{"year":2025,"cited_by_count":102},{"year":2024,"cited_by_count":67},{"year":2023,"cited_by_count":15}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
