{"id":"https://openalex.org/W4393906048","doi":"https://doi.org/10.1109/access.2024.3384840","title":"An Efficient Hybrid Feature Selection Technique Toward Prediction of Suspicious URLs in IoT Environment","display_name":"An Efficient Hybrid Feature Selection Technique Toward Prediction of Suspicious URLs in IoT Environment","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4393906048","doi":"https://doi.org/10.1109/access.2024.3384840"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3384840","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3384840","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10489965.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10489965.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102657718","display_name":"Sanjukta Mohanty","orcid":null},"institutions":[{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sanjukta Mohanty","raw_affiliation_strings":["School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India","institution_ids":["https://openalex.org/I67357951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082529961","display_name":"Arup Abhinna Acharya","orcid":"https://orcid.org/0000-0002-2528-4228"},"institutions":[{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arup Abhinna Acharya","raw_affiliation_strings":["School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India","institution_ids":["https://openalex.org/I67357951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016711703","display_name":"Tarek Gaber","orcid":"https://orcid.org/0000-0003-4065-4191"},"institutions":[{"id":"https://openalex.org/I114794399","display_name":"Suez Canal University","ror":"https://ror.org/02m82p074","country_code":"EG","type":"education","lineage":["https://openalex.org/I114794399"]},{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["EG","GB"],"is_corresponding":false,"raw_author_name":"Tarek Gaber","raw_affiliation_strings":["School of Science, Engineering, and Environment, University of Salford, Salford, U.K","School of Science, Engineering, and Environment University of Salford, Manchester, Manchester, UK","Faculty of Computers and Informatics, Suez Canal University, Ismailia, Ismailia, Egypt"],"raw_orcid":"https://orcid.org/0000-0003-4065-4191","affiliations":[{"raw_affiliation_string":"School of Science, Engineering, and Environment, University of Salford, Salford, U.K","institution_ids":["https://openalex.org/I54459138"]},{"raw_affiliation_string":"School of Science, Engineering, and Environment University of Salford, Manchester, Manchester, UK","institution_ids":["https://openalex.org/I54459138"]},{"raw_affiliation_string":"Faculty of Computers and Informatics, Suez Canal University, Ismailia, Ismailia, Egypt","institution_ids":["https://openalex.org/I114794399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064441432","display_name":"Namita Panda","orcid":"https://orcid.org/0000-0002-4956-3715"},"institutions":[{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Namita Panda","raw_affiliation_strings":["School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha, India","institution_ids":["https://openalex.org/I67357951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073879900","display_name":"Esraa Eldesouky","orcid":"https://orcid.org/0000-0002-6519-0963"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Esraa Eldesouky","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047918826","display_name":"Ibrahim A. Hameed","orcid":"https://orcid.org/0000-0003-1252-260X"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Ibrahim A. Hameed","raw_affiliation_strings":["Department of ICT and Natural Sciences, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, &#x00C5;lesund, Norway","Department of ICT and Natrual Sciences, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Larsgardsvegen 2, Alesund, Norway"],"raw_orcid":"https://orcid.org/0000-0003-1252-260X","affiliations":[{"raw_affiliation_string":"Department of ICT and Natural Sciences, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, &#x00C5;lesund, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Department of ICT and Natrual Sciences, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Larsgardsvegen 2, Alesund, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102657718"],"corresponding_institution_ids":["https://openalex.org/I67357951"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.8002,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97597714,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"50578","last_page":"50594"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8071682453155518},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7385954260826111},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5980396270751953},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5166469216346741},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4924961030483246},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.46302878856658936},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4115757346153259},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3327951431274414},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3234667181968689},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1850009262561798}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8071682453155518},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7385954260826111},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5980396270751953},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5166469216346741},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4924961030483246},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.46302878856658936},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4115757346153259},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3327951431274414},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3234667181968689},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1850009262561798},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3384840","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3384840","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10489965.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ee6c72b3ea4048229df327e1db4c1a6e","is_oa":true,"landing_page_url":"https://doaj.org/article/ee6c72b3ea4048229df327e1db4c1a6e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 50578-50594 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3384840","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3384840","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10489965.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G604726058","display_name":null,"funder_award_id":"PSAU/2023/R/1445","funder_id":"https://openalex.org/F4320311227","funder_display_name":"Prince Sattam bin Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320311227","display_name":"Prince Sattam bin Abdulaziz University","ror":"https://ror.org/04jt46d36"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393906048.pdf","grobid_xml":"https://content.openalex.org/works/W4393906048.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W194239996","https://openalex.org/W572368116","https://openalex.org/W2013280855","https://openalex.org/W2068325098","https://openalex.org/W2158868693","https://openalex.org/W2167101736","https://openalex.org/W2266293701","https://openalex.org/W2295598076","https://openalex.org/W2401897194","https://openalex.org/W2517207665","https://openalex.org/W2555509818","https://openalex.org/W2580641941","https://openalex.org/W2595467185","https://openalex.org/W2758333994","https://openalex.org/W2795475639","https://openalex.org/W2906351126","https://openalex.org/W2956014179","https://openalex.org/W2964104998","https://openalex.org/W2973954733","https://openalex.org/W3012400144","https://openalex.org/W3035894350","https://openalex.org/W3036900957","https://openalex.org/W3096377556","https://openalex.org/W3127432888","https://openalex.org/W3139259445","https://openalex.org/W3141949679","https://openalex.org/W3158143049","https://openalex.org/W3177187359","https://openalex.org/W3200170908","https://openalex.org/W3210736474","https://openalex.org/W4200347630","https://openalex.org/W4220682970","https://openalex.org/W4221063379","https://openalex.org/W4225140064","https://openalex.org/W4229007882","https://openalex.org/W4248613107","https://openalex.org/W4280496878","https://openalex.org/W4283170759","https://openalex.org/W4320016062","https://openalex.org/W4322761626","https://openalex.org/W6607880405","https://openalex.org/W6732691979","https://openalex.org/W6758972637"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"With":[0],"the":[1,13,31,56,78,89,110,121,139,142,144,164,181,187,203,211,217,223,227,241,247,259,270],"growth":[2],"of":[3,8,33,66,82,92,112,123,132,141,172,183,189,205,213,229,232],"IoT,":[4],"a":[5,116,190,194,230,236],"vast":[6],"number":[7],"devices":[9,19,219,279],"are":[10,20],"connected":[11],"to":[12,22,30,40,69,98,119,239,245],"web.":[14],"Consequently,":[15],"both":[16,126],"users":[17],"and":[18,80,128,157,170,193,234],"susceptible":[21],"deception":[23],"by":[24,176],"intruders":[25],"through":[26],"malicious":[27,206,214],"links":[28,215],"leading":[29],"disclosure":[32],"personal":[34],"information.":[35],"Hence,":[36,118],"it":[37,275],"is":[38,200],"essential":[39],"identify":[41],"suspicious":[42],"URLs":[43,93,133,207],"before":[44],"accessing":[45],"them.":[46],"While":[47],"numerous":[48],"researchers":[49,145],"have":[50,179],"proposed":[51,224,255],"several":[52],"URL":[53],"detection":[54,101,212],"approaches,":[55],"machine":[57],"learning-based":[58],"technique":[59],"stands":[60],"out":[61],"as":[62,163,208,210],"particularly":[63],"effective":[64],"because":[65],"its":[67,74],"ability":[68],"detect":[70],"zero-day":[71],"attacks;":[72],"however,":[73],"success":[75],"depends":[76],"on":[77],"type":[79],"dimension":[81],"features":[83,91,131,148,233],"utilized.":[84],"In":[85],"earlier":[86],"research,":[87],"only":[88],"lexical":[90,127],"were":[94],"employed":[95],"for":[96,109,166,277],"classification":[97],"attain":[99],"high":[100],"speeds.":[102],"However,":[103,160],"this":[104],"approach":[105,225,256],"does":[106],"not":[107],"allow":[108],"retrieval":[111],"comprehensive":[113],"information":[114],"about":[115],"website.":[117],"enhance":[120],"security":[122],"IoT":[124,218],"devices,":[125],"page":[129],"content-based":[130],"must":[134],"be":[135],"considered.":[136],"To":[137],"improve":[138],"performance":[140],"model,":[143],"extract":[146],"informative":[147],"using":[149],"different":[150],"Feature":[151],"Selection":[152],"Techniques":[153],"(FSTs),":[154],"including":[155],"filter":[156],"wrapper":[158,195],"methods.":[159],"challenges":[161],"such":[162],"demand":[165],"more":[167],"resources,":[168],"time,":[169],"handling":[171],"high-dimensional":[173],"datasets":[174],"encountered":[175],"individual":[177],"FSTs":[178],"driven":[180],"development":[182],"hybrid":[184,237],"FSTs.":[185],"Nevertheless,":[186],"combination":[188],"filter-based":[191],"FST":[192,238],"search-based":[196],"Genetic":[197],"Algorithm":[198],"(GA)":[199],"used":[201],"in":[202,216,280],"identification":[204],"well":[209],"research":[220,260,266],"studies.":[221],"Therefore,":[222],"leverages":[226],"advantages":[228],"variety":[231],"explores":[235],"produce":[240],"optimal":[242],"feature":[243],"subset":[244],"evaluate":[246],"boosting":[248],"estimators":[249],"with":[250,263],"specific":[251],"hyperparameter":[252],"configurations.":[253],"Our":[254],"effectively":[257],"fills":[258],"gap":[261],"associated":[262],"previous":[264],"methodologies":[265],"99%":[267],"while":[268],"keeping":[269],"computational":[271],"costs":[272],"minimal,":[273],"making":[274],"suitable":[276],"resource-constrained":[278],"detecting":[281],"malignant":[282],"URLs.":[283]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
