{"id":"https://openalex.org/W4416056823","doi":"https://doi.org/10.1109/icecet63943.2025.11471974","title":"CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection","display_name":"CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W4416056823","doi":"https://doi.org/10.1109/icecet63943.2025.11471974"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11471974","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11471974","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2510.18585","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086668805","display_name":"Fouad Trad","orcid":"https://orcid.org/0000-0003-2241-8195"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Fouad Trad","raw_affiliation_strings":["American University of Beirut,Electrical and Computer Engineering,Beirut,Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut,Electrical and Computer Engineering,Beirut,Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["American University of Beirut,Electrical and Computer Engineering,Beirut,Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut,Electrical and Computer Engineering,Beirut,Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086668805"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46401924,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9343000054359436},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.435699999332428},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.3434999883174896},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.31940001249313354},{"id":"https://openalex.org/keywords/recall","display_name":"Recall","score":0.29989999532699585},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.2842000126838684}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9343000054359436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322999835014343},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4375999867916107},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.435699999332428},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31619998812675476},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.29989999532699585},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C2777526259","wikidata":"https://www.wikidata.org/wiki/Q221836","display_name":"Flash (photography)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.2660999894142151}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icecet63943.2025.11471974","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11471974","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2510.18585","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.18585","pdf_url":"https://arxiv.org/pdf/2510.18585","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2510.18585","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2510.18585","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2510.18585","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.18585","pdf_url":"https://arxiv.org/pdf/2510.18585","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"websites":[1,26],"remain":[2],"a":[3,19,43,90,137,176],"significant":[4],"cybersecurity":[5],"threat,":[6],"necessitating":[7],"accurate":[8],"and":[9,64,113,120,154,175],"cost-effective":[10],"detection":[11,103,184,207],"mechanisms.":[12],"In":[13],"this":[14],"paper,":[15],"we":[16,79,193],"present":[17],"CLASP,":[18],"novel":[20],"system":[21,47,143],"that":[22,57,93,122],"effectively":[23],"identifies":[24],"phishing":[25,70,183,206],"by":[27],"leveraging":[28],"multiple":[29,82],"intelligent":[30],"agents,":[31],"built":[32],"using":[33],"large":[34],"language":[35],"models":[36],"(LLMs),":[37],"to":[38,67,116],"analyze":[39],"different":[40],"aspects":[41],"of":[42,134,149,158,203],"web":[44],"resource.":[45],"The":[46],"processes":[48],"URLs":[49],"or":[50],"QR":[51],"codes,":[52],"employing":[53],"specialized":[54],"LLM-based":[55],"agents":[56,119],"evaluate":[58],"the":[59,95,127,142,186,201],"URL":[60],"structure,":[61],"webpage":[62],"screenshot,":[63],"HTML":[65],"content":[66],"predict":[68],"potential":[69],"threats.":[71],"To":[72,189],"optimize":[73],"performance":[74,129],"while":[75],"minimizing":[76],"operational":[77],"costs,":[78],"experimented":[80],"with":[81,130],"combination":[83,92],"strategies":[84],"for":[85,182],"agent-based":[86],"analysis,":[87],"ultimately":[88],"designing":[89],"strategic":[91],"ensures":[94],"per-website":[96],"evaluation":[97],"expense":[98],"remains":[99],"minimal":[100],"without":[101],"compromising":[102],"accuracy.":[104],"We":[105],"tested":[106],"various":[107],"LLMs,":[108],"including":[109],"Gemini":[110,123],"1.5":[111,124],"Flash":[112,125],"GPT-4o":[114],"mini,":[115],"build":[117],"these":[118],"found":[121],"achieved":[126],"best":[128],"an":[131,145,155],"F1":[132,180],"score":[133,181],"83.01%":[135],"on":[136,185],"newly":[138],"curated":[139],"dataset.":[140,188],"Also,":[141],"maintained":[144],"average":[146],"processing":[147],"time":[148],"2.78":[150],"seconds":[151],"per":[152,161],"website":[153],"API":[156],"cost":[157],"around":[159],"$3.18":[160],"1,000":[162],"websites.":[163],"Moreover,":[164],"CLASP":[165],"surpasses":[166],"leading":[167],"previous":[168],"solutions,":[169],"achieving":[170],"over":[171],"40%":[172],"higher":[173],"recall":[174],"20%":[177],"improvement":[178],"in":[179],"collected":[187],"support":[190],"further":[191],"research,":[192],"have":[194],"made":[195],"our":[196],"dataset":[197],"publicly":[198],"available,":[199],"supporting":[200],"development":[202],"more":[204],"advanced":[205],"systems.":[208]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2025-10-24T00:00:00"}
