{"id":"https://openalex.org/W2899428374","doi":"https://doi.org/10.1109/icccnt.2018.8494159","title":"Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks","display_name":"Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2899428374","doi":"https://doi.org/10.1109/icccnt.2018.8494159","mag":"2899428374"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt.2018.8494159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt.2018.8494159","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006717160","display_name":"Anu Vazhayil","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anu Vazhayil","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112825787","display_name":"R. Vinayakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Vinayakumar","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113113768","display_name":"K. P. Soman","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K.P. Soman","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006717160"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":10.2099,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.98233824,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9342488050460815},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8077085018157959},{"id":"https://openalex.org/keywords/bigram","display_name":"Bigram","score":0.7921206951141357},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6305134296417236},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6283412575721741},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6240848302841187},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5877432227134705},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.523377537727356},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39270204305648804},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3533545732498169},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21117696166038513}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9342488050460815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8077085018157959},{"id":"https://openalex.org/C108757681","wikidata":"https://www.wikidata.org/wiki/Q2773912","display_name":"Bigram","level":3,"score":0.7921206951141357},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6305134296417236},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6283412575721741},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6240848302841187},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5877432227134705},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.523377537727356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39270204305648804},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3533545732498169},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21117696166038513},{"id":"https://openalex.org/C137546455","wikidata":"https://www.wikidata.org/wiki/Q3213474","display_name":"Trigram","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt.2018.8494159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt.2018.8494159","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309480","display_name":"Nvidia","ror":"https://ror.org/03jdj4y14"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W145737868","https://openalex.org/W640375500","https://openalex.org/W1522301498","https://openalex.org/W1832693441","https://openalex.org/W2003471189","https://openalex.org/W2053774863","https://openalex.org/W2064675550","https://openalex.org/W2110485445","https://openalex.org/W2116261113","https://openalex.org/W2148614760","https://openalex.org/W2162808666","https://openalex.org/W2345652415","https://openalex.org/W2402144811","https://openalex.org/W2791078573","https://openalex.org/W2802296803","https://openalex.org/W2919115771","https://openalex.org/W2953384591","https://openalex.org/W2964121744","https://openalex.org/W4254816979","https://openalex.org/W4285719527","https://openalex.org/W6713134421"],"related_works":["https://openalex.org/W3173084154","https://openalex.org/W2982021180","https://openalex.org/W2251497876","https://openalex.org/W2241081188","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W3167935049","https://openalex.org/W3029198973"],"abstract_inverted_index":{"In":[0],"the":[1,23,35,41,63,76,81,85,156,163],"modern":[2],"epoch,":[3],"all":[4],"information":[5],"is":[6],"easily":[7],"accessible":[8],"through":[9],"websites":[10,52],"and":[11,29,96,140],"due":[12],"to":[13,25,74,100,148],"this":[14,90],"reason":[15],"people":[16],"rely":[17],"completely":[18],"on":[19],"online":[20,32],"resources.":[21],"On":[22,152],"contrary":[24],"its":[26,93],"advantages,":[27],"privacy":[28],"security":[30],"in":[31,43,84],"media":[33],"are":[34,72],"main":[36],"concern":[37],"worldwide":[38],"because":[39],"of":[40,50,87,159,165],"rise":[42],"phishing":[44,51,88,104,166],"attacks":[45],"launched":[46],"online.":[47],"The":[48],"number":[49,86],"increases":[53],"every":[54],"month":[55],"targeting":[56],"more":[57],"than":[58],"450":[59],"brands,":[60],"as":[61,145],"per":[62],"reports":[64],"published":[65],"by":[66],"anti-phishing":[67],"working":[68],"groups(APWG).":[69],"Traditionally":[70],"blacklists":[71],"used":[73,147],"detect":[75,101,149],"URL":[77],"attacks.":[78],"But":[79],"with":[80],"exponential":[82],"increase":[83],"websites,":[89],"method":[91],"has":[92],"own":[94],"limitations":[95],"it":[97],"also":[98],"fails":[99],"newly":[102],"generated":[103],"URLs":[105],"which":[106],"can":[107],"be":[108],"solved":[109],"using":[110,131],"machine":[111,125],"learning":[112,115,126,134],"or":[113],"deep":[114,133],"techniques.":[116],"Here":[117],"we":[118],"present":[119],"a":[120],"comparative":[121],"study":[122],"between":[123],"classical":[124],"technique":[127],"-":[128],"logistic":[129],"regression":[130],"bigram,":[132],"techniques":[135],"like":[136],"convolution":[137],"neural":[138],"network(CNN)":[139],"CNN":[141],"long":[142],"short-term":[143],"memory(CNN-LSTM)":[144],"architectures":[146],"malicious":[150],"URLs.":[151,167],"comparison":[153],"CNN-LSTM":[154],"gave":[155],"best":[157],"accuracy":[158],"about":[160],"98%":[161],"for":[162],"classification":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
