{"id":"https://openalex.org/W3214943785","doi":"https://doi.org/10.1109/isi53945.2021.9624751","title":"Generating Optimal Attack Paths in Generative Adversarial Phishing","display_name":"Generating Optimal Attack Paths in Generative Adversarial Phishing","publication_year":2021,"publication_date":"2021-11-02","ids":{"openalex":"https://openalex.org/W3214943785","doi":"https://doi.org/10.1109/isi53945.2021.9624751","mag":"3214943785"},"language":"en","primary_location":{"id":"doi:10.1109/isi53945.2021.9624751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067713416","display_name":"Rayah Al-Qurashi","orcid":null},"institutions":[{"id":"https://openalex.org/I85507684","display_name":"Yarmouk University","ror":"https://ror.org/004mbaj56","country_code":"JO","type":"education","lineage":["https://openalex.org/I85507684"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Rayah Al-Qurashi","raw_affiliation_strings":["Yarmouk University, Jordan"],"affiliations":[{"raw_affiliation_string":"Yarmouk University, Jordan","institution_ids":["https://openalex.org/I85507684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060546610","display_name":"Ahmed Aleroud","orcid":"https://orcid.org/0000-0003-4337-1488"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed AlEroud","raw_affiliation_strings":["Augusta University, GA, USA"],"affiliations":[{"raw_affiliation_string":"Augusta University, GA, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061713871","display_name":"Ahmad A. Saifan","orcid":"https://orcid.org/0000-0002-4974-8939"},"institutions":[{"id":"https://openalex.org/I85507684","display_name":"Yarmouk University","ror":"https://ror.org/004mbaj56","country_code":"JO","type":"education","lineage":["https://openalex.org/I85507684"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad A. Saifan","raw_affiliation_strings":["Yarmouk University, Jordan"],"affiliations":[{"raw_affiliation_string":"Yarmouk University, Jordan","institution_ids":["https://openalex.org/I85507684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102775330","display_name":"Mohammad Ahmad Alsmadi","orcid":"https://orcid.org/0000-0002-6429-5229"},"institutions":[{"id":"https://openalex.org/I134118262","display_name":"Lewis University","ror":"https://ror.org/0376vhj74","country_code":"US","type":"education","lineage":["https://openalex.org/I134118262"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Alsmadi","raw_affiliation_strings":["Lewis University, Chicago, USA"],"affiliations":[{"raw_affiliation_string":"Lewis University, Chicago, USA","institution_ids":["https://openalex.org/I134118262"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075965221","display_name":"Izzat Alsmadi","orcid":"https://orcid.org/0000-0001-7832-5081"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Izzat Alsmadi","raw_affiliation_strings":["Texas A&M, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&M, San Antonio, USA","institution_ids":["https://openalex.org/I1335518801"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067713416"],"corresponding_institution_ids":["https://openalex.org/I85507684"],"apc_list":null,"apc_paid":null,"fwci":0.6798,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76391242,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8321824669837952},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.8123891353607178},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8072941303253174},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7312295436859131},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6319443583488464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5618847012519836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5592425465583801},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48432862758636475},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.456490695476532},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4157807230949402},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4111790060997009},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3985893130302429},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13202613592147827},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08478325605392456}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8321824669837952},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.8123891353607178},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8072941303253174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7312295436859131},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6319443583488464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5618847012519836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5592425465583801},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48432862758636475},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.456490695476532},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4157807230949402},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4111790060997009},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3985893130302429},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13202613592147827},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08478325605392456},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi53945.2021.9624751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2037021247","https://openalex.org/W2040750298","https://openalex.org/W2591788621","https://openalex.org/W2603766943","https://openalex.org/W2625935159","https://openalex.org/W2787225914","https://openalex.org/W2796585196","https://openalex.org/W2889836475","https://openalex.org/W2891827878","https://openalex.org/W2913301826","https://openalex.org/W2913694443","https://openalex.org/W2949824501","https://openalex.org/W2953822176","https://openalex.org/W2954590176","https://openalex.org/W2965469092","https://openalex.org/W2969215546","https://openalex.org/W2996625456","https://openalex.org/W2999300566","https://openalex.org/W3012459057","https://openalex.org/W3020483042","https://openalex.org/W3037441603","https://openalex.org/W4247200422","https://openalex.org/W6734028196","https://openalex.org/W6759770223"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W3034267371"],"abstract_inverted_index":{"Phishing":[0],"attacks":[1,26,33,60],"have":[2,94],"witnessed":[3],"a":[4,148],"rapid":[5],"increase":[6],"thanks":[7],"to":[8,69,87,97,135],"the":[9,103,136],"matured":[10],"social":[11],"engineering":[12,76],"techniques,":[13],"COVID-19":[14],"pandemic,":[15],"and":[16,84],"recently":[17],"adversarial":[18,24,58],"deep":[19],"learning":[20,48],"techniques.":[21],"Even":[22],"though":[23],"phishing":[25,49,59,99],"are":[27,30],"recent,":[28],"attackers":[29],"crafting":[31],"such":[32,78],"by":[34,61],"considering":[35],"context,":[36],"testing":[37],"different":[38,111],"attack":[39,91],"paths,":[40],"then":[41,89,109],"selecting":[42],"paths":[43],"that":[44,56,67,93,126],"can":[45],"evade":[46,98],"machine":[47],"detectors.":[50,100],"This":[51],"research":[52],"proposes":[53],"an":[54],"approach":[55],"generates":[57],"finding":[62],"optimal":[63],"subsets":[64],"of":[65,106],"features":[66,146],"lead":[68],"higher":[70,95],"evasion":[71,104,112,121,132],"rate.":[72,122],"We":[73,101],"used":[74],"feature":[75],"techniques":[77],"as":[79,114],"Recursive":[80],"Feature":[81],"Elimination,":[82],"Lasso,":[83],"Cancel":[85],"Out":[86],"generate":[88],"test":[90],"vectors":[92],"potential":[96],"tested":[102],"performance":[105],"each":[107],"technique":[108],"classified":[110],"tests":[113],"passed":[115],"or":[116],"failed":[117],"depending":[118],"on":[119],"their":[120],"Our":[123],"findings":[124],"showed":[125],"our":[127],"threat":[128],"model":[129],"has":[130],"better":[131],"capability":[133],"compared":[134],"original":[137],"Generative":[138],"Adversarial":[139],"Deep":[140],"Neural":[141],"Network":[142],"(GAN)":[143],"which":[144],"perturbs":[145],"in":[147],"random":[149],"manner.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
