{"id":"https://openalex.org/W4404035212","doi":"https://doi.org/10.1109/access.2024.3491429","title":"Multi-Modal Comparative Analysis on Execution of Phishing Detection Using Artificial Intelligence","display_name":"Multi-Modal Comparative Analysis on Execution of Phishing Detection Using Artificial Intelligence","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404035212","doi":"https://doi.org/10.1109/access.2024.3491429"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3491429","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491429","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3491429","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077468129","display_name":"Divya Jennifer Dsouza","orcid":"https://orcid.org/0000-0001-9007-2582"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Divya Jennifer Dsouza","raw_affiliation_strings":["Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), India"],"raw_orcid":"https://orcid.org/0000-0001-9007-2582","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018031070","display_name":"Anisha P Rodrigues","orcid":"https://orcid.org/0000-0002-3050-4555"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anisha P. Rodrigues","raw_affiliation_strings":["Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), India"],"raw_orcid":"https://orcid.org/0000-0002-3050-4555","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE (Deemed to be University), India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055597318","display_name":"Roshan Fernandes","orcid":"https://orcid.org/0000-0002-7625-3296"},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Roshan Fernandes","raw_affiliation_strings":["Department of Cyber Security, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","Department of Cyber Security, NMAM Institute of Technology, NITTE (Deemed to be University), India"],"raw_orcid":"https://orcid.org/0000-0002-7625-3296","affiliations":[{"raw_affiliation_string":"Department of Cyber Security, NMAM Institute of Technology, NITTE (Deemed to be University), Nitte, India","institution_ids":[]},{"raw_affiliation_string":"Department of Cyber Security, NMAM Institute of Technology, NITTE (Deemed to be University), India","institution_ids":["https://openalex.org/I1333540553"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077468129"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.9524,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88528828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":null,"first_page":"163016","last_page":"163041"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9225000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9225000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7641475200653076},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7639458179473877},{"id":"https://openalex.org/keywords/modal","display_name":"Modal","score":0.5445667505264282},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4076838493347168},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14730513095855713},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13565364480018616}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7641475200653076},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7639458179473877},{"id":"https://openalex.org/C71139939","wikidata":"https://www.wikidata.org/wiki/Q910194","display_name":"Modal","level":2,"score":0.5445667505264282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4076838493347168},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14730513095855713},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13565364480018616},{"id":"https://openalex.org/C188027245","wikidata":"https://www.wikidata.org/wiki/Q750446","display_name":"Polymer chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3491429","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491429","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4cb4c8e13bfa4e56898fe37bb4e0e66d","is_oa":true,"landing_page_url":"https://doaj.org/article/4cb4c8e13bfa4e56898fe37bb4e0e66d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 163016-163041 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3491429","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3491429","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320331825","display_name":"NMAM Institute of Technology","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2758333994","https://openalex.org/W2782609208","https://openalex.org/W2788346622","https://openalex.org/W2802855132","https://openalex.org/W2909737018","https://openalex.org/W2944669302","https://openalex.org/W2973954733","https://openalex.org/W3033013607","https://openalex.org/W3047536849","https://openalex.org/W3048942180","https://openalex.org/W3085804088","https://openalex.org/W3088060078","https://openalex.org/W3119876417","https://openalex.org/W3134585127","https://openalex.org/W3194014961","https://openalex.org/W3195446130","https://openalex.org/W3200560861","https://openalex.org/W4211089080","https://openalex.org/W4220908317","https://openalex.org/W4221129096","https://openalex.org/W4224119655","https://openalex.org/W4285360594","https://openalex.org/W4285413758","https://openalex.org/W4288066979","https://openalex.org/W4298858017","https://openalex.org/W4309765541","https://openalex.org/W4313588323","https://openalex.org/W4315643577","https://openalex.org/W4316012700","https://openalex.org/W4319996419","https://openalex.org/W4321483498","https://openalex.org/W4322736749","https://openalex.org/W4323065767","https://openalex.org/W4323542800","https://openalex.org/W4362586487","https://openalex.org/W4362655576","https://openalex.org/W4366131867","https://openalex.org/W4368358283","https://openalex.org/W4375858721","https://openalex.org/W4383503463","https://openalex.org/W4384469965","https://openalex.org/W4386006826","https://openalex.org/W4387826905","https://openalex.org/W4387967373","https://openalex.org/W4388853806","https://openalex.org/W4390691540","https://openalex.org/W4391113002","https://openalex.org/W4393932362","https://openalex.org/W4396822711","https://openalex.org/W4400921443","https://openalex.org/W6849241715","https://openalex.org/W6858039225","https://openalex.org/W6861314293","https://openalex.org/W6888773943"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031"],"abstract_inverted_index":{"Phishing":[0],"is":[1,121,135,170,222],"the":[2,31,42,60,64,73,78,90,98,129,200,210,217,227,234,240,258,262,270,280,288],"process":[3,99],"of":[4,22,33,54,59,63,96,199,209,231,233,245,255,279],"deceiving":[5],"or":[6,9,52],"stealing":[7],"private":[8],"confidential":[10],"information":[11],"through":[12],"illicit":[13],"means.":[14],"This":[15],"could":[16],"lead":[17],"to":[18,50,76,88,123,158],"financial":[19],"loss,":[20],"loss":[21,207],"reputation,":[23],"and":[24,29,93,179,196,204,206,229,236],"identity":[25],"theft.":[26],"Hence,":[27],"identifying":[28],"preventing":[30],"use":[32,278],"such":[34,189],"phishing":[35,102,118,125],"sites":[36],"becomes":[37],"crucial.":[38],"In":[39],"data":[40,55,83,143],"science,":[41],"term":[43],"outlier,":[44],"also":[45,151],"termed":[46],"an":[47,253],"anomaly":[48],"refers":[49],"points":[51],"series":[53],"that":[56],"opt":[57],"out":[58,153,172],"normal":[61],"behaviour":[62],"system":[65],"under":[66],"study.":[67,147,241],"Anomaly":[68],"detection":[69],"touches":[70],"down":[71],"on":[72,154,257],"concepts":[74],"related":[75],"studying":[77],"authentic":[79],"outlier":[80],"in":[81,144,163,173,269],"a":[82,155,164],"set.":[84],"The":[85,104,116,148,168,185,220,242],"paper":[86],"aims":[87],"present":[89,162],"optimised":[91],"techniques":[92],"multiple":[94],"modes":[95,235],"executing":[97],"for":[100,110,137,141,239,249],"detecting":[101,138],"websites.":[103],"most":[105],"relevant":[106],"features":[107],"are":[108,150,214],"chosen":[109],"execution":[111,246],"by":[112,225],"applying":[113],"feature":[114],"extraction.":[115],"Mendley":[117],"websites":[119],"dataset":[120,157,260],"used":[122,136,238],"detect":[124],"websites,":[126],"along":[127],"with":[128,252,284],"SPAM-HAM":[130],"publicly":[131,165],"available":[132,166,268],"dataset,":[133],"which":[134],"SPAM/HAM":[139],"classification":[140],"SMS":[142],"this":[145],"research":[146],"experiments":[149],"carried":[152,171],"custom":[156,259],"avoid":[159],"any":[160],"bias":[161],"dataset.":[167],"study":[169,221],"three":[174],"modes,":[175],"namely":[176],"offline,":[177],"batch,":[178],"incremental,":[180],"using":[181,261],"machine":[182,201],"learning":[183,202,212,282],"models.":[184],"performance":[186],"evaluation":[187],"metrics":[188,208],"as":[190],"accuracy,":[191],"f1":[192],"score,":[193],"precision,":[194],"recall,":[195],"time":[197],"complexity":[198],"models":[203,213,237],"accuracy":[205,254,289],"deep":[211,281],"compared":[215],"between":[216],"different":[218],"modes.":[219],"then":[223],"summarised":[224],"detailing":[226],"pros":[228],"cons":[230],"each":[232],"incremental":[243],"mode":[244],"suits":[247],"better":[248],"real-time":[250],"processing,":[251],"97.1%":[256],"adaptive":[263],"random":[264],"forest":[265],"(ARF)":[266],"classifier":[267],"Python\u2019s":[271],"River":[272],"Framework.":[273],"But":[274],"if":[275],"we":[276],"make":[277],"approach":[283],"Keras":[285],"sequential":[286],"model,":[287],"obtained":[290],"was":[291],"99.28%.":[292]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
