{"id":"https://openalex.org/W7081942014","doi":"https://doi.org/10.1109/tkde.2025.3609320","title":"PRIME: A Phishing Detection Framework With Quantitative and Fuzzy-Based Dual Validation","display_name":"PRIME: A Phishing Detection Framework With Quantitative and Fuzzy-Based Dual Validation","publication_year":2025,"publication_date":"2025-09-12","ids":{"openalex":"https://openalex.org/W7081942014","doi":"https://doi.org/10.1109/tkde.2025.3609320"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2025.3609320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3609320","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yicun Tian","orcid":"https://orcid.org/0009-0009-7026-5067"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yicun Tian","raw_affiliation_strings":["Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["Data61, CSIRO, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ming Ding","orcid":"https://orcid.org/0000-0002-3690-0321"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ming Ding","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shigang Liu","orcid":"https://orcid.org/0000-0002-3122-6745"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shigang Liu","raw_affiliation_strings":["Data61, CSIRO, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Pei-Wei Tsai","orcid":"https://orcid.org/0000-0002-9429-8957"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Pei-Wei Tsai","raw_affiliation_strings":["Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93722401,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"37","issue":"11","first_page":"6597","last_page":"6609"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.4153999984264374,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.4153999984264374,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13177","display_name":"Geological and Geophysical Studies","score":0.03849999979138374,"subfield":{"id":"https://openalex.org/subfields/1907","display_name":"Geology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.03020000085234642,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8141000270843506},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5972999930381775},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5634999871253967},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.48260000348091125},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.42149999737739563},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.41190001368522644},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.3984000086784363},{"id":"https://openalex.org/keywords/recall","display_name":"Recall","score":0.3928999900817871}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8141000270843506},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8026999831199646},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5972999930381775},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5634999871253967},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4453999996185303},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.42149999737739563},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41040000319480896},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.3984000086784363},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.3928999900817871},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3682999908924103},{"id":"https://openalex.org/C2776085556","wikidata":"https://www.wikidata.org/wiki/Q183361","display_name":"Chen","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34880000352859497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32690000534057617},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.31700000166893005},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3052000105381012},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2825999855995178},{"id":"https://openalex.org/C95986675","wikidata":"https://www.wikidata.org/wiki/Q185168","display_name":"Quantitative analysis (chemistry)","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.26429998874664307}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2025.3609320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3609320","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2002964284","https://openalex.org/W2072981546","https://openalex.org/W2113449956","https://openalex.org/W2544613100","https://openalex.org/W2783033852","https://openalex.org/W2944103016","https://openalex.org/W2969852018","https://openalex.org/W3011774524","https://openalex.org/W3179968378","https://openalex.org/W4240840618","https://openalex.org/W4288057710","https://openalex.org/W4309765541","https://openalex.org/W4393150198","https://openalex.org/W4398199945","https://openalex.org/W4399412887","https://openalex.org/W4401607251","https://openalex.org/W4402674224","https://openalex.org/W4402925642","https://openalex.org/W4403360640","https://openalex.org/W4404360363","https://openalex.org/W4404783125","https://openalex.org/W4408941302","https://openalex.org/W4409657243","https://openalex.org/W4410644253","https://openalex.org/W4411205956","https://openalex.org/W4411712365","https://openalex.org/W4413993509"],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"continue":[2],"to":[3,21,48,72],"pose":[4],"a":[5,37,106],"significant":[6],"cybersecurity":[7],"threat,":[8],"especially":[9],"as":[10],"social":[11],"engineering":[12],"(SE)":[13],"tactics":[14],"become":[15],"more":[16],"contextually":[17],"embedded":[18],"and":[19,31,66,90,109,132,139,154],"difficult":[20],"detect.":[22],"To":[23],"address":[24],"the":[25,74,99,126,130],"limitations":[26],"of":[27,129],"traditional":[28],"rule-based":[29],"framework":[30,41],"AI-driven":[32],"classifiers,":[33],"we":[34],"propose":[35],"PRIME,":[36],"phishing":[38,157],"email":[39],"evaluation":[40],"that":[42],"leverages":[43],"large":[44],"language":[45],"models":[46],"(LLMs)":[47],"assess":[49],"manipulative":[50],"intent":[51],"across":[52,112],"six":[53],"interpretable":[54],"criteria.":[55],"Three":[56],"risk":[57,79],"scoring":[58],"strategies,":[59],"namely":[60],"equal":[61],"weighting,":[62],"semantically":[63],"weighted":[64],"scoring,":[65],"fuzzy":[67],"logic-based":[68],"classification,":[69],"are":[70],"applied":[71],"aggregate":[73],"criterion":[75,120],"scores":[76],"into":[77],"multi-level":[78],"assessments.":[80],"Qualitative":[81],"comparisons":[82],"with":[83,98],"established":[84],"frameworks":[85],"demonstrate":[86],"PRIME\u2019s":[87],"broad":[88],"coverage":[89],"conceptual":[91],"soundness.":[92],"Quantitative":[93],"experiments":[94],"validate":[95],"its":[96],"effectiveness,":[97],"fuzzy-based":[100],"method":[101],"achieving":[102],"perfect":[103],"recall":[104],"on":[105],"phishing-only":[107],"dataset":[108],"consistent":[110],"performance":[111],"multiple":[113],"years.":[114],"An":[115],"ablation":[116],"study,":[117],"where":[118],"each":[119],"is":[121],"removed":[122],"in":[123,135,156],"turn,":[124],"highlights":[125],"critical":[127],"role":[128],"Context":[131],"Content":[133],"dimension":[134],"detecting":[136],"both":[137],"explicit":[138],"subtle":[140],"SE":[141],"cues.":[142],"By":[143],"separating":[144],"LLMs":[145],"interpretation":[146],"from":[147],"final":[148],"decision-making,":[149],"PRIME":[150],"enhances":[151],"transparency,":[152],"robustness,":[153],"adaptability":[155],"detection":[158],"systems.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
