{"id":"https://openalex.org/W4403938354","doi":"https://doi.org/10.1109/iscc61673.2024.10733689","title":"Enhancing Phishing Detection: A Multi-Layer Ensemble Approach Integrating Machine Learning for Robust Cybersecurity","display_name":"Enhancing Phishing Detection: A Multi-Layer Ensemble Approach Integrating Machine Learning for Robust Cybersecurity","publication_year":2024,"publication_date":"2024-06-26","ids":{"openalex":"https://openalex.org/W4403938354","doi":"https://doi.org/10.1109/iscc61673.2024.10733689"},"language":"en","primary_location":{"id":"doi:10.1109/iscc61673.2024.10733689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc61673.2024.10733689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001584575","display_name":"Candra Ahmadi","orcid":"https://orcid.org/0000-0001-6583-2156"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Candra Ahmadi","raw_affiliation_strings":["National Taiwan University of Science and Technology (NTUST),Dept. Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology (NTUST),Dept. Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111862021","display_name":"Jiann-Liang Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jiann-Liang Chen","raw_affiliation_strings":["National Taiwan University of Science and Technology (NTUST),Dept. Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology (NTUST),Dept. Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I154864474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001584575"],"corresponding_institution_ids":["https://openalex.org/I154864474"],"apc_list":null,"apc_paid":null,"fwci":1.0958,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79846154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.78912752866745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616176009178162},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5549561977386475},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5323458313941956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43871286511421204},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39006713032722473},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18443462252616882},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17187052965164185}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.78912752866745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616176009178162},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5549561977386475},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5323458313941956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43871286511421204},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39006713032722473},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18443462252616882},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17187052965164185},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc61673.2024.10733689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc61673.2024.10733689","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W3166487251","https://openalex.org/W3216928879","https://openalex.org/W4206116579","https://openalex.org/W4206428177","https://openalex.org/W4211016117","https://openalex.org/W4213081600","https://openalex.org/W4225917617","https://openalex.org/W4226443146","https://openalex.org/W4226492624","https://openalex.org/W4285278771","https://openalex.org/W4288391591","https://openalex.org/W4297035156","https://openalex.org/W4312555046","https://openalex.org/W4312887856","https://openalex.org/W4313588323","https://openalex.org/W4319996419","https://openalex.org/W4322706916","https://openalex.org/W4323065767","https://openalex.org/W4384157913","https://openalex.org/W4390045897"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4388020458"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1,33],"a":[2,35,85,120,133,168,177],"critical":[3,160],"concern":[4],"in":[5,38,45,71,123,162],"our":[6,117],"increasingly":[7],"digital":[8],"world,":[9],"with":[10,48,183],"phishing":[11,30,110,153,173],"attacks":[12],"posing":[13],"one":[14],"of":[15,65,87,109,137],"the":[16,39,61,105,184],"most":[17],"insidious":[18],"threats":[19,44],"to":[20,41,57,60,69,103,129,151],"individual":[21],"and":[22,51,73,101,107,147],"organizational":[23],"security.":[24],"Although":[25],"machine":[26,89],"learning":[27,90],"has":[28],"revolutionized":[29],"detection,":[31],"there":[32],"still":[34],"considerable":[36],"gap":[37],"ability":[40],"detect":[42],"such":[43],"real":[46],"time":[47,136],"high":[49],"accuracy":[50,106],"efficiency.":[52],"Current":[53],"methods":[54],"often":[55],"fail":[56],"dynamically":[58,150],"adapt":[59],"rapidly":[62],"evolving":[63],"tactics":[64],"cyber":[66],"adversaries,":[67],"leading":[68],"gaps":[70],"detection":[72,124,174],"prevention":[74],"capabilities.":[75],"We":[76],"introduce":[77],"an":[78],"optimized":[79],"Multi-Layer":[80],"Ensemble":[81],"Model":[82],"that":[83,116,180],"leverages":[84],"combination":[86],"advanced":[88],"classifiers,":[91],"including":[92],"K-nearest":[93],"neighbors,":[94],"Decision":[95],"Trees,":[96],"Random":[97],"Forest,":[98],"Extra":[99],"Tree,":[100],"XGBoost,":[102],"enhance":[104],"efficiency":[108],"website":[111],"detection.":[112],"Experimental":[113],"results":[114],"demonstrate":[115],"model":[118,141],"achieves":[119],"significant":[121],"improvement":[122],"accuracy,":[125],"rising":[126],"from":[127],"95.99%":[128],"97.25%,":[130],"while":[131],"maintaining":[132],"minimal":[134],"response":[135],"4.8":[138],"seconds.":[139],"This":[140,155],"effectively":[142],"reduces":[143],"both":[144],"false":[145],"positives":[146],"negatives,":[148],"adapting":[149],"new":[152,169],"tactics.":[154],"advancement":[156],"not":[157],"only":[158],"addresses":[159],"vulnerabilities":[161],"cybersecurity":[163],"defenses":[164],"but":[165],"also":[166],"sets":[167],"benchmark":[170],"for":[171],"real-time":[172],"systems,":[175],"offering":[176],"scalable":[178],"solution":[179],"can":[181],"evolve":[182],"threat":[185],"landscape.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
