{"id":"https://openalex.org/W3210626219","doi":"https://doi.org/10.1109/icccnt51525.2021.9579888","title":"Detecting Phishing of Short Uniform Resource Locators using classification techniques","display_name":"Detecting Phishing of Short Uniform Resource Locators using classification techniques","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3210626219","doi":"https://doi.org/10.1109/icccnt51525.2021.9579888","mag":"3210626219"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579888","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579888","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046441290","display_name":"Kerin Pithawala","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kerin Pithawala","raw_affiliation_strings":["Mukesh Patel School of Technology Management and Engineering, Shirpur, India"],"affiliations":[{"raw_affiliation_string":"Mukesh Patel School of Technology Management and Engineering, Shirpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039147514","display_name":"Sakshi Jagtap","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sakshi Jagtap","raw_affiliation_strings":["Mukesh Patel School of Technology Management and Engineering, Shirpur, India"],"affiliations":[{"raw_affiliation_string":"Mukesh Patel School of Technology Management and Engineering, Shirpur, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077390047","display_name":"Preksha Cholachgud","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Preksha Cholachgud","raw_affiliation_strings":["Mukesh Patel School of Technology Management and Engineering, Shirpur, India"],"affiliations":[{"raw_affiliation_string":"Mukesh Patel School of Technology Management and Engineering, Shirpur, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046441290"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5508,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7405079,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9099911451339722},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6299729347229004},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6160447597503662},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.6120110154151917},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.504602313041687},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4274842441082001},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.419466108083725},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3829192817211151},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.31731677055358887},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28056594729423523},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.19770920276641846},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.07212522625923157}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9099911451339722},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6299729347229004},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6160447597503662},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.6120110154151917},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.504602313041687},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4274842441082001},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.419466108083725},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3829192817211151},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31731677055358887},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28056594729423523},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.19770920276641846},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.07212522625923157}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579888","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579888","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1516540700","https://openalex.org/W2347140731","https://openalex.org/W2478132006","https://openalex.org/W2564868606","https://openalex.org/W2580641941","https://openalex.org/W2782609208","https://openalex.org/W2974976566","https://openalex.org/W2981633456","https://openalex.org/W3024119512","https://openalex.org/W3121960994","https://openalex.org/W6788509728"],"related_works":["https://openalex.org/W2782609208","https://openalex.org/W3088188605","https://openalex.org/W4367336074","https://openalex.org/W3154045278","https://openalex.org/W4379620016","https://openalex.org/W3210764983","https://openalex.org/W3089416646","https://openalex.org/W4367335949","https://openalex.org/W4380048833","https://openalex.org/W4285162676"],"abstract_inverted_index":{"Phishing":[0,40],"is":[1,92,119],"a":[2,5,8],"technique":[3],"wherein":[4],"hacker":[6],"clones":[7,61],"legitimate":[9],"website,":[10],"email":[11],"id,":[12],"graphic":[13],"design":[14],"and":[15,29,51,143,153],"asks":[16],"the":[17,22,47,75,112,122],"target":[18],"to":[19,70,73,131],"act":[20],"on":[21],"deceptive":[23],"link":[24],"for":[25],"getting":[26],"sensitive":[27],"company":[28],"personal":[30],"data.":[31],"Approximately":[32],"78":[33],"per":[34,155],"cent":[35,156],"of":[36,39,54,60,150],"cyber-attacks":[37],"consist":[38],"techniques.":[41],"There":[42,77],"are":[43,78],"websites":[44],"which":[45],"store":[46],"Uniform":[48,102,114,135],"Resource":[49,103,115,136],"Locators":[50,104],"domain":[52],"name":[53],"phished":[55,133],"sites.":[56],"However,":[57,107],"ample":[58],"amounts":[59],"emerge":[62],"every":[63],"day.":[64],"Hence":[65],"it":[66],"takes":[67],"time":[68],"up":[69],"several":[71],"days":[72],"update":[74],"websites.":[76],"many":[79],"techniques":[80],"in":[81,101,111],"phishing":[82],"that":[83],"even":[84],"experienced":[85],"technologists":[86],"cannot":[87],"detect.":[88],"This":[89],"cyber-security":[90],"threat":[91],"not":[93],"easily":[94],"identifiable":[95],"by":[96],"looking.":[97],"Association":[98],"rule":[99],"mining":[100],"detects":[105],"phishing.":[106],"with":[108],"an":[109,148],"increase":[110],"shortened":[113],"Locators-":[116],"less":[117],"information":[118],"derived":[120],"from":[121],"uniform":[123],"resource":[124],"locator.":[125],"We":[126],"use":[127],"machine":[128],"learning":[129],"algorithms":[130],"detect":[132],"shorten":[134],"Locators.":[137],"Naive":[138],"Bayes":[139],"Theorem,":[140],"Logistic":[141],"Regression":[142],"Random":[144],"Forests":[145],"Algorithm":[146],"produced":[147],"accuracy":[149],"99.4,":[151],"96":[152],"98":[154],"respectively.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
