{"id":"https://openalex.org/W4404057391","doi":"https://doi.org/10.1109/ccci61916.2024.10736460","title":"Machine Learning-Based Security Mechanism for Detecting Phishing Attacks","display_name":"Machine Learning-Based Security Mechanism for Detecting Phishing Attacks","publication_year":2024,"publication_date":"2024-10-16","ids":{"openalex":"https://openalex.org/W4404057391","doi":"https://doi.org/10.1109/ccci61916.2024.10736460"},"language":"en","primary_location":{"id":"doi:10.1109/ccci61916.2024.10736460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci61916.2024.10736460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000571978","display_name":"P. D. Bhatt","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pragya Bhatt","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["University of Jordan,KASIT,Amman,Jordan,11942"],"affiliations":[{"raw_affiliation_string":"University of Jordan,KASIT,Amman,Jordan,11942","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093798829","display_name":"Gagan Dangwal","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gagan Dangwal","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research International Institute of Information Technology,Hyderabad,India,500 032"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research International Institute of Information Technology,Hyderabad,India,500 032","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059353810","display_name":"Balqies Sadoun","orcid":"https://orcid.org/0000-0003-2032-5964"},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Balqies Sadoun","raw_affiliation_strings":["College of Engineering, Al-Balqa&#x2019; Applied University,Al-Salt,Jordan,19117"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Al-Balqa&#x2019; Applied University,Al-Salt,Jordan,19117","institution_ids":["https://openalex.org/I33926330"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000571978"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":1.6284,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88258396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7409501075744629},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7373548746109009},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5829587578773499},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5223425626754761},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1856791377067566},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16303640604019165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7409501075744629},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7373548746109009},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5829587578773499},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5223425626754761},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1856791377067566},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16303640604019165},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccci61916.2024.10736460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci61916.2024.10736460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W626692671","https://openalex.org/W1582036582","https://openalex.org/W2768094440","https://openalex.org/W3049069627","https://openalex.org/W3091655831","https://openalex.org/W3111310396","https://openalex.org/W3112545613","https://openalex.org/W3133596308","https://openalex.org/W3166487251","https://openalex.org/W3207470445","https://openalex.org/W3215769141","https://openalex.org/W4213250052","https://openalex.org/W4285093070","https://openalex.org/W4303673347","https://openalex.org/W4313533011","https://openalex.org/W4376114171","https://openalex.org/W4381052924","https://openalex.org/W4382810655","https://openalex.org/W4386427053","https://openalex.org/W4387711818"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031"],"abstract_inverted_index":{"Phishing":[0,30],"attacks":[1],"pose":[2],"a":[3,88,153,159],"serious":[4],"threat":[5],"to":[6,58,107,145,157],"online":[7],"users":[8],"by":[9],"impersonatina":[10],"trustworthy":[11],"entities":[12],"and":[13,98,110,114,141,148],"stealing":[14],"sensitive":[15],"data.":[16],"This":[17,117],"can":[18],"result":[19],"in":[20,49,71,105],"reputational":[21],"damage,":[22],"financial":[23],"loss,":[24],"ransomware,":[25],"or":[26],"additional":[27],"spyware":[28],"outbreaks.":[29],"scams":[31],"take":[32],"into":[33],"consideration":[34],"roughly":[35,62],"22%":[36],"of":[37,44,64,80,122,152,155],"all":[38,65],"data":[39],"violations,":[40],"making":[41],"it":[42],"one":[43],"the":[45,52,120,139,150,173,177],"most":[46],"prominent":[47],"cybercrimes,":[48],"accordance":[50],"with":[51,182],"FBI's":[53],"2021":[54],"IC3":[55],"report.":[56],"According":[57],"phishing":[59,74,89,115,134,164],"email":[60],"statistics,":[61],"1.2%":[63],"emails":[66,75,83],"received":[67],"are":[68,102,131],"fraudulent,":[69],"resulting":[70],"3.4":[72],"billion":[73],"per":[76],"day.":[77],"One":[78],"out":[79],"every":[81],"4,200":[82],"sent":[84],"is":[85],"almost":[86],"certainly":[87],"attempt.":[90],"Cognitive":[91],"methods,":[92],"such":[93],"as":[94],"machine":[95,124],"learning":[96,100,125],"(ML)":[97],"deep":[99],"(DL),":[101],"widely":[103],"used":[104,132,138],"cybersecurity":[106],"extract":[108],"information":[109],"detect":[111],"possible":[112],"intrusions":[113],"attempts.":[116],"research":[118],"investigates":[119],"procedure":[121],"employing":[123],"methods":[126],"for":[127,133],"recognizing":[128],"URLs":[129,143],"that":[130,172],"attacks.":[135],"We":[136],"have":[137],"Pristine":[140],"Malicious":[142],"Dataset":[144],"train,":[146],"test,":[147],"evaluate":[149],"performance":[151],"set":[154],"algorithms":[156],"develop":[158],"robust":[160],"binary":[161],"class":[162],"URL":[163],"attack":[165],"detection":[166],"mechanism.":[167],"The":[168],"obtained":[169],"results":[170],"show":[171],"proposed":[174],"mechanism":[175],"outperforms":[176],"other":[178],"existing":[179],"competing":[180],"mechanisms":[181],"99.6%":[183],"accuracy.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
