{"id":"https://openalex.org/W7131897978","doi":"https://doi.org/10.1109/tr.2026.3668659","title":"URL2Path: A Robust Graph Learning Approach for Malicious URL Detection","display_name":"URL2Path: A Robust Graph Learning Approach for Malicious URL Detection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7131897978","doi":"https://doi.org/10.1109/tr.2026.3668659"},"language":null,"primary_location":{"id":"doi:10.1109/tr.2026.3668659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2026.3668659","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127136900","display_name":"Mahdi Rabbani","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mahdi Rabbani","raw_affiliation_strings":["Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Morteza Eskandarian","orcid":"https://orcid.org/0009-0002-0561-8590"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Morteza Eskandarian","raw_affiliation_strings":["Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mansur Mirani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100817","display_name":"Vancouver Infectious Diseases Centre","ror":"https://ror.org/0159q3366","country_code":"CA","type":"healthcare","lineage":["https://openalex.org/I4210100817"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mansur Mirani","raw_affiliation_strings":["Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I4210100817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062697540","display_name":"Gunjan Piya","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100817","display_name":"Vancouver Infectious Diseases Centre","ror":"https://ror.org/0159q3366","country_code":"CA","type":"healthcare","lineage":["https://openalex.org/I4210100817"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gunjan Piya","raw_affiliation_strings":["Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I4210100817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127234181","display_name":"Igor Opushnyev","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100817","display_name":"Vancouver Infectious Diseases Centre","ror":"https://ror.org/0159q3366","country_code":"CA","type":"healthcare","lineage":["https://openalex.org/I4210100817"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Igor Opushnyev","raw_affiliation_strings":["Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I4210100817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110206775","display_name":"Rongxing Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["School of Computing, Queen&#x2019;s University, Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen&#x2019;s University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125738921","display_name":"Sajjad Dadkhah","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sajjad Dadkhah","raw_affiliation_strings":["Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5127136900"],"corresponding_institution_ids":["https://openalex.org/I106938459"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46046377,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"75","issue":null,"first_page":"1145","last_page":"1159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8507999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8507999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.03660000115633011,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.019300000742077827,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.772599995136261},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7641000151634216},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6876000165939331},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6678000092506409},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6269000172615051},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4154999852180481},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.3691999912261963},{"id":"https://openalex.org/keywords/cosine-similarity","display_name":"Cosine similarity","score":0.36160001158714294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8564000129699707},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.772599995136261},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7641000151634216},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6876000165939331},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6678000092506409},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6269000172615051},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5297999978065491},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45170000195503235},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4154999852180481},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C2780762811","wikidata":"https://www.wikidata.org/wiki/Q1784941","display_name":"Cosine similarity","level":3,"score":0.36160001158714294},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.3605000078678131},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C176982825","wikidata":"https://www.wikidata.org/wiki/Q835922","display_name":"Lexical analysis","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C130318100","wikidata":"https://www.wikidata.org/wiki/Q2268914","display_name":"Semantic similarity","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.289000004529953},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2858000099658966},{"id":"https://openalex.org/C2778828372","wikidata":"https://www.wikidata.org/wiki/Q5283209","display_name":"Distributional semantics","level":3,"score":0.28290000557899475},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.2809999883174896},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.272599995136261},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2026.3668659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2026.3668659","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"remain":[2],"one":[3],"of":[4,134,139,149],"the":[5,147],"most":[6],"popular,":[7],"damaging":[8],"cyber":[9],"threats,":[10],"with":[11,93],"malicious":[12],"Uniform":[13],"Resource":[14],"Locators":[15],"(URLs)":[16],"acting":[17],"as":[18],"a":[19,82,109],"primary":[20],"vector":[21],"for":[22],"credential":[23],"theft,":[24],"malware":[25],"distribution.":[26],"Traditional":[27],"detection":[28,86,193],"approaches,":[29],"based":[30],"on":[31],"phishing":[32,41,84],"keyword":[33],"matching,":[34],"static":[35],"rule-based":[36],"systems,":[37],"struggle":[38],"against":[39,142,183,208],"modern":[40],"attempts":[42],"due":[43],"to":[44,62,152,202],"syntactic":[45],"variability,":[46],"semantic":[47,115],"obfuscation,":[48],"adversarial":[49,145,173,209],"manipulation.":[50],"Recent":[51],"advances":[52],"in":[53,129],"Large":[54],"Language":[55],"Models":[56],"(LLMs)":[57],"have":[58],"further":[59],"enabled":[60],"attackers":[61],"generate":[63],"visually":[64],"deceptive,":[65],"syntactically":[66],"diverse":[67],"URLs":[68,155],"that":[69,88,162],"evade":[70],"lexical":[71,90],"similarity":[72],"filters.":[73],"To":[74],"address":[75],"these":[76],"emerging":[77],"challenges,":[78],"this":[79],"paper":[80],"introduces":[81],"content-independent":[83],"URL":[85,101],"framework":[87],"combines":[89],"feature":[91],"extraction":[92],"graph-based":[94],"reasoning.":[95],"The":[96,179],"proposed":[97],"technique,":[98],"URL2Path,":[99],"tokenizes":[100],"strings":[102],"into":[103,156],"sequential":[104],"segments,":[105],"maps":[106],"them":[107],"onto":[108],"homogeneous":[110],"directed":[111],"graph,":[112],"where":[113],"structural,":[114],"patterns":[116],"are":[117],"captured":[118],"using":[119],"DeepWalk-based":[120],"node":[121],"embeddings.":[122],"This":[123],"approach":[124],"addresses":[125],"three":[126],"key":[127],"limitations":[128],"existing":[130],"systems:":[131],"limited":[132],"scalability":[133,201],"content-based":[135],"detection,":[136],"weak":[137],"robustness":[138,207],"traditional":[140],"models":[141],"LLM":[143],"generated":[144],"URLs,":[146],"absence":[148],"graph-structured":[150],"reasoning":[151],"vectorize":[153],"raw":[154],"expressive":[157],"representations.":[158],"Experimental":[159],"evaluations":[160],"show":[161],"URL2Path":[163],"achieves":[164],"superior":[165],"precision,":[166],"recall,":[167],"F1-score,":[168],"particularly":[169],"under":[170],"cross-dataset":[171],"validation,":[172],"stress":[174],"testing,":[175],"imbalanced":[176],"training":[177],"conditions.":[178],"model":[180],"is":[181],"benchmarked":[182],"recent":[184],"lightweight":[185],"LLMs":[186],"(BERT-Tiny,":[187],"DeBERTa-v3,":[188],"ModernBERT,":[189],"DeepSeek),":[190],"demonstrating":[191],"improved":[192],"accuracy,":[194],"faster":[195],"inference.":[196],"Additionally,":[197],"we":[198],"assess":[199],"its":[200],"million-scale":[203],"datasets,":[204],"cross-domain":[205],"generalization,":[206],"perturbations.":[210]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-02-28T00:00:00"}
