{"id":"https://openalex.org/W7141693353","doi":"https://doi.org/10.1109/icce67443.2026.11449651","title":"User-Centric Phishing Detection: A RAG and LLM-Based Approach","display_name":"User-Centric Phishing Detection: A RAG and LLM-Based Approach","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7141693353","doi":"https://doi.org/10.1109/icce67443.2026.11449651"},"language":null,"primary_location":{"id":"doi:10.1109/icce67443.2026.11449651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130799997","display_name":"Abrar Hamed Al Barwani","orcid":null},"institutions":[{"id":"https://openalex.org/I39706905","display_name":"German University of Technology","ror":"https://ror.org/055hq4920","country_code":"OM","type":"education","lineage":["https://openalex.org/I39706905"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Abrar Hamed Al Barwani","raw_affiliation_strings":["German University of Technology in Oman,Sultanate of Oman"],"affiliations":[{"raw_affiliation_string":"German University of Technology in Oman,Sultanate of Oman","institution_ids":["https://openalex.org/I39706905"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008293013","display_name":"Abdelaziz Amara Korba","orcid":"https://orcid.org/0000-0001-7605-4660"},"institutions":[{"id":"https://openalex.org/I39706905","display_name":"German University of Technology","ror":"https://ror.org/055hq4920","country_code":"OM","type":"education","lineage":["https://openalex.org/I39706905"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Abdelaziz Amara Korba","raw_affiliation_strings":["German University of Technology in Oman,Sultanate of Oman"],"affiliations":[{"raw_affiliation_string":"German University of Technology in Oman,Sultanate of Oman","institution_ids":["https://openalex.org/I39706905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031916377","display_name":"Raja Waseem Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I39706905","display_name":"German University of Technology","ror":"https://ror.org/055hq4920","country_code":"OM","type":"education","lineage":["https://openalex.org/I39706905"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Raja Waseem Anwar","raw_affiliation_strings":["German University of Technology in Oman,Sultanate of Oman"],"affiliations":[{"raw_affiliation_string":"German University of Technology in Oman,Sultanate of Oman","institution_ids":["https://openalex.org/I39706905"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5130799997"],"corresponding_institution_ids":["https://openalex.org/I39706905"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93564782,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.45210000872612},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2897000014781952},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.2623000144958496},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.2500999867916107},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.2379000037908554}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4832000136375427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4690000116825104},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.45210000872612},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3955000042915344},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.31610000133514404},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.2500999867916107},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.2379000037908554},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2353000044822693}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce67443.2026.11449651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2618014102","https://openalex.org/W4285247275","https://openalex.org/W4392667162","https://openalex.org/W4407304063","https://openalex.org/W4408089038","https://openalex.org/W4408324826","https://openalex.org/W4411712365","https://openalex.org/W4413993509","https://openalex.org/W4414196960","https://openalex.org/W4415124086","https://openalex.org/W7138850588"],"related_works":[],"abstract_inverted_index":{"The":[0],"escalating":[1],"sophistication":[2],"of":[3,76,134],"phishing":[4,42,53],"emails":[5,40,81],"necessitates":[6],"a":[7,51,73,92,138,149],"shift":[8],"beyond":[9],"traditional":[10],"rule-based":[11],"and":[12,43,82,88,112,121,136,156],"conventional":[13],"machine-learning-based":[14],"detectors.":[15],"Although":[16],"large":[17],"language":[18,24],"models":[19],"(LLMs)":[20],"offer":[21],"strong":[22],"natural":[23],"understanding,":[25],"using":[26],"them":[27],"as":[28,41],"standalone":[29],"classifiers":[30],"often":[31],"yields":[32],"elevated":[33],"false-positive":[34],"(FP)":[35],"rates,":[36],"which":[37],"mislabel":[38],"legitimate":[39,80],"create":[44],"significant":[45],"operational":[46],"burden.":[47],"This":[48],"paper":[49],"presents":[50],"personalized":[52],"detection":[54],"framework":[55],"that":[56,148,165],"integrates":[57],"LLMs":[58,108],"with":[59,85,143],"retrieval-augmented":[60],"generation":[61],"(RAG).":[62],"For":[63],"each":[64],"message,":[65],"the":[66,77,98],"system":[67],"constructs":[68],"user-specific":[69],"context":[70],"by":[71],"retrieving":[72],"compact":[74],"set":[75],"user\u2019s":[78],"historical":[79],"enriching":[83],"it":[84],"real-time":[86],"domain":[87],"URL":[89],"reputation":[90],"from":[91,119],"cyber-threat":[93],"intelligence":[94],"platform,":[95],"then":[96],"conditions":[97],"LLM\u2019s":[99],"decision":[100],"on":[101,114],"this":[102],"evidence.":[103],"We":[104],"evaluate":[105],"four":[106],"open-source":[107],"(Llama4-Scout,":[109],"DeepSeek-R1,":[110],"Mistral-Saba,":[111],"Gemma2)":[113],"an":[115,132],"email":[116,162],"dataset":[117],"collected":[118],"public":[120],"institutional":[122],"sources.":[123],"Results":[124],"show":[125],"high":[126],"performance;":[127],"for":[128,158],"example,":[129],"Llama4-Scout":[130],"attains":[131],"F1-score":[133],"0.9703":[135],"achieves":[137],"66.7%":[139],"reduction":[140],"in":[141],"FPs":[142],"RAG.":[144],"These":[145],"findings":[146],"validate":[147],"RAG-based,":[150],"user-profiling":[151],"approach":[152],"is":[153],"both":[154],"feasible":[155],"effective":[157],"building":[159],"high-precision,":[160],"low-friction":[161],"security":[163],"systems":[164],"adapt":[166],"to":[167],"individual":[168],"communication":[169],"patterns.":[170]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
