{"id":"https://openalex.org/W7117550503","doi":"https://doi.org/10.1109/access.2025.3649636","title":"A Novel Hybrid Approach for Identification of Discriminative Features in Phishing Emails","display_name":"A Novel Hybrid Approach for Identification of Discriminative Features in Phishing Emails","publication_year":2025,"publication_date":"2025-12-30","ids":{"openalex":"https://openalex.org/W7117550503","doi":"https://doi.org/10.1109/access.2025.3649636"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3649636","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649636","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3649636","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115791987","display_name":"Ramadhani Mbura","orcid":null},"institutions":[{"id":"https://openalex.org/I97231232","display_name":"Nelson Mandela African Institution of Science and Technology","ror":"https://ror.org/041vsn055","country_code":"TZ","type":"education","lineage":["https://openalex.org/I97231232"]}],"countries":["TZ"],"is_corresponding":true,"raw_author_name":"Ramadhani K. Mbura","raw_affiliation_strings":["School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"],"affiliations":[{"raw_affiliation_string":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania","institution_ids":["https://openalex.org/I97231232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021434789","display_name":"Agrey Kato","orcid":"https://orcid.org/0000-0003-0246-8320"},"institutions":[{"id":"https://openalex.org/I97231232","display_name":"Nelson Mandela African Institution of Science and Technology","ror":"https://ror.org/041vsn055","country_code":"TZ","type":"education","lineage":["https://openalex.org/I97231232"]}],"countries":["TZ"],"is_corresponding":false,"raw_author_name":"Agrey Kato Benedicto","raw_affiliation_strings":["School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"],"affiliations":[{"raw_affiliation_string":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania","institution_ids":["https://openalex.org/I97231232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089972726","display_name":"Ramadhani Sinde","orcid":"https://orcid.org/0000-0001-8993-0332"},"institutions":[{"id":"https://openalex.org/I97231232","display_name":"Nelson Mandela African Institution of Science and Technology","ror":"https://ror.org/041vsn055","country_code":"TZ","type":"education","lineage":["https://openalex.org/I97231232"]}],"countries":["TZ"],"is_corresponding":false,"raw_author_name":"Ramadhani Sinde","raw_affiliation_strings":["School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"],"affiliations":[{"raw_affiliation_string":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania","institution_ids":["https://openalex.org/I97231232"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115791987"],"corresponding_institution_ids":["https://openalex.org/I97231232"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.4958,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.95116956,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"14","issue":null,"first_page":"995","last_page":"1013"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.9248999953269958},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7272999882698059},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6510000228881836},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5831999778747559},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5145000219345093},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4684000015258789},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.42170000076293945},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3287999927997589}],"concepts":[{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.9248999953269958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8256000280380249},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7272999882698059},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6510000228881836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.636900007724762},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6205000281333923},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5831999778747559},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5145000219345093},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4684000015258789},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42170000076293945},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.32850000262260437},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3183000087738037},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.2703999876976013},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.25760000944137573}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3649636","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649636","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3649636","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3649636","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.7790576815605164}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W2894350870","https://openalex.org/W3089418071","https://openalex.org/W3090717071","https://openalex.org/W3091852949","https://openalex.org/W3094117827","https://openalex.org/W3094291258","https://openalex.org/W3118773135","https://openalex.org/W3133843004","https://openalex.org/W3141951428","https://openalex.org/W3194357095","https://openalex.org/W3200824799","https://openalex.org/W4206130810","https://openalex.org/W4206564180","https://openalex.org/W4213081600","https://openalex.org/W4221098338","https://openalex.org/W4225727688","https://openalex.org/W4285093070","https://openalex.org/W4289792603","https://openalex.org/W4293204578","https://openalex.org/W4311184467","https://openalex.org/W4312961006","https://openalex.org/W4313160666","https://openalex.org/W4319053879","https://openalex.org/W4322706916","https://openalex.org/W4323065767","https://openalex.org/W4361009432","https://openalex.org/W4381250293","https://openalex.org/W4383346212","https://openalex.org/W4385409983","https://openalex.org/W4386512177","https://openalex.org/W4386963531","https://openalex.org/W4387770589","https://openalex.org/W4387967373","https://openalex.org/W4388083189","https://openalex.org/W4389786616","https://openalex.org/W4390052151","https://openalex.org/W4390277872","https://openalex.org/W4391592188","https://openalex.org/W4392188566","https://openalex.org/W4395070449","https://openalex.org/W4395959904","https://openalex.org/W4396597818","https://openalex.org/W4396931975","https://openalex.org/W4400098547","https://openalex.org/W4400458391","https://openalex.org/W4401607251","https://openalex.org/W4401815367","https://openalex.org/W4403678603","https://openalex.org/W4404075990","https://openalex.org/W4404301041","https://openalex.org/W4404569134","https://openalex.org/W4405654320","https://openalex.org/W4405755818","https://openalex.org/W4406043290","https://openalex.org/W4406479237","https://openalex.org/W4407666650","https://openalex.org/W4408089038","https://openalex.org/W4408197509","https://openalex.org/W4408520399","https://openalex.org/W4408977593","https://openalex.org/W4409830690","https://openalex.org/W4410042160","https://openalex.org/W4411589842","https://openalex.org/W4414638152","https://openalex.org/W4415003351"],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"pose":[2],"a":[3,38,45,63,186,214],"growing":[4],"threat":[5],"to":[6,14,28,78,101,222],"individuals":[7],"and":[8,99,140,151,163,170,185,209,225],"organizations":[9],"globally,":[10],"leveraging":[11],"deceptive":[12],"emails":[13,86],"trick":[15],"users":[16],"into":[17],"divulging":[18],"sensitive":[19],"information":[20],"or":[21,131],"installing":[22],"malware.":[23],"Traditional":[24],"anti-phishing":[25],"systems":[26],"struggle":[27],"keep":[29],"pace":[30],"with":[31,72,180,198],"these":[32,145],"dynamic":[33],"attacks,":[34],"making":[35],"machine":[36,227],"learning":[37,228],"promising":[39],"alternative":[40],"for":[41,54,159,230],"effective":[42],"detection.":[43],"However,":[44],"key":[46],"challenge":[47],"is":[48],"identifying":[49],"the":[50,80,103,148,174,194,218],"most":[51,81,104,125],"influential":[52],"features":[53,83,116,126,196,220],"accurate":[55],"classification.":[56],"To":[57],"address":[58],"this":[59,202],"gap,":[60],"we":[61,93],"propose":[62],"hybrid":[64,152],"approach":[65],"that":[66,110,124],"combines":[67],"Exploratory":[68],"Data":[69],"Analysis":[70],"(EDA)":[71],"Random":[73],"Forest":[74],"(RF)-based":[75],"feature":[76,95,237],"importance":[77,100],"identify":[79],"discriminative":[82,105,146],"in":[84,136],"phishing":[85,231],"across":[87],"diverse":[88],"datasets.":[89],"In":[90],"our":[91],"experiments,":[92],"analyzed":[94],"distributions,":[96],"correlations,":[97],"engineering,":[98],"rank":[102],"features.":[106],"Our":[107],"results":[108],"revealed":[109],"only":[111,205],"28":[112],"out":[113],"of":[114,168,189,217],"145":[115],"(19%)":[117],"were":[118,128,157],"identified":[119],"as":[120],"discriminative.":[121],"This":[122],"suggested":[123],"(81%)":[127],"redundant,":[129],"irrelevant,":[130],"lacked":[132],"predictive":[133],"power,":[134],"resulting":[135],"unnecessary":[137],"computational":[138],"complexity":[139],"hindering":[141],"model":[142,176],"performance.":[143],"Using":[144],"features,":[147,211],"RF,":[149],"XGB,":[150],"Kim\u2019s":[153],"Text":[154],"CNN":[155,175],"models":[156,165,229],"evaluated":[158],"validation.":[160],"The":[161],"RF":[162],"XGB":[164],"achieved":[166,177],"accuracies":[167],"97.6%":[169],"97.4%,":[171],"respectively,":[172],"while":[173,234],"superior":[178],"performance":[179],"99.9%":[181],"accuracy,":[182],"0.9993":[183],"recall,":[184],"perfect":[187],"ROC-AUC":[188],"1.000":[190],"when":[191],"trained":[192],"on":[193,206],"12":[195],"combined":[197],"text":[199],"embeddings.":[200],"Although":[201],"study":[203],"focused":[204],"URL-based,":[207],"content-based,":[208],"domain-based":[210],"it":[212],"provides":[213],"comprehensive":[215],"understanding":[216],"distinguishing":[219],"required":[221],"build":[223],"robust":[224],"efficient":[226],"email":[232],"detection":[233],"substantially":[235],"reducing":[236],"redundancy.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-01-08T20:05:33.558190","created_date":"2025-12-30T00:00:00"}
