{"id":"https://openalex.org/W4388593521","doi":"https://doi.org/10.1145/3625343.3625348","title":"Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms","display_name":"Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms","publication_year":2023,"publication_date":"2023-09-15","ids":{"openalex":"https://openalex.org/W4388593521","doi":"https://doi.org/10.1145/3625343.3625348"},"language":"en","primary_location":{"id":"doi:10.1145/3625343.3625348","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3625343.3625348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054700379","display_name":"Ayoub Alsarhan","orcid":"https://orcid.org/0000-0001-9075-2828"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ayoub Alsarhan","raw_affiliation_strings":["Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-9075-2828","affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091376289","display_name":"Bashar Igried","orcid":"https://orcid.org/0000-0001-6255-236X"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bashar Igried","raw_affiliation_strings":["Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-6255-236X","affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080191757","display_name":"Raad Mohammad Bani Saleem","orcid":"https://orcid.org/0009-0006-2568-405X"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Raad Mohammad Bani Saleem","raw_affiliation_strings":["Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"],"raw_orcid":"https://orcid.org/0009-0006-2568-405X","affiliations":[{"raw_affiliation_string":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051819567","display_name":"Mohammad Alauthman","orcid":"https://orcid.org/0000-0003-0319-1968"},"institutions":[{"id":"https://openalex.org/I36622005","display_name":"Petra University","ror":"https://ror.org/039d9es10","country_code":"JO","type":"education","lineage":["https://openalex.org/I36622005"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alauthman","raw_affiliation_strings":["Department of Information Security, University of Petra, Jordan"],"raw_orcid":"https://orcid.org/0000-0003-0319-1968","affiliations":[{"raw_affiliation_string":"Department of Information Security, University of Petra, Jordan","institution_ids":["https://openalex.org/I36622005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015923093","display_name":"Mohammad Aljaidi","orcid":"https://orcid.org/0000-0001-9486-3533"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Aljaidi","raw_affiliation_strings":["Faculty of Information Technology, Zarqa University, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-9486-3533","affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Zarqa University, Jordan","institution_ids":["https://openalex.org/I153687341"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054700379"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":7.6231,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.97341555,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9770570993423462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7728822231292725},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5557592511177063},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5176432728767395},{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.4788929522037506},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.47685158252716064},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.47311922907829285},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4341810643672943},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4245436191558838},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.4101654887199402},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3521841764450073},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33024924993515015},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2620135545730591},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.25639212131500244},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21656697988510132},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.1745913326740265}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9770570993423462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7728822231292725},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5557592511177063},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5176432728767395},{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.4788929522037506},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.47685158252716064},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.47311922907829285},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4341810643672943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4245436191558838},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.4101654887199402},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3521841764450073},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33024924993515015},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2620135545730591},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25639212131500244},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21656697988510132},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.1745913326740265},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3625343.3625348","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3625343.3625348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1680797894","https://openalex.org/W2561826616","https://openalex.org/W2783033852","https://openalex.org/W2892847381","https://openalex.org/W2971561269","https://openalex.org/W3088547738","https://openalex.org/W3094291258","https://openalex.org/W3106126975","https://openalex.org/W4211043792","https://openalex.org/W4213287278","https://openalex.org/W4288040184","https://openalex.org/W4294162736","https://openalex.org/W4323019813","https://openalex.org/W6637349233"],"related_works":["https://openalex.org/W2782811261","https://openalex.org/W2997511728","https://openalex.org/W4214653893","https://openalex.org/W2149097950","https://openalex.org/W4378417285","https://openalex.org/W3124731355","https://openalex.org/W3036853918","https://openalex.org/W3211372245","https://openalex.org/W2505282017","https://openalex.org/W3013263334"],"abstract_inverted_index":{"Phishing":[0],"constitutes":[1],"a":[2,66,79,107],"significant":[3],"threat":[4],"in":[5,31,99],"the":[6,48,93,104,113,139,146],"digital":[7],"world,":[8],"often":[9],"exploiting":[10],"human":[11],"vulnerabilities":[12],"to":[13,38,46,58,78,149,155,158],"illicitly":[14],"obtain":[15],"sensitive":[16],"data":[17],"such":[18,124],"as":[19,125],"personal":[20,36],"credentials,":[21],"financial":[22,33],"details,":[23],"and":[24,35,75,128,137,166],"private":[25],"information.":[26],"Misusing":[27],"this":[28],"information":[29],"results":[30,91],"substantial":[32],"loss":[34],"harm":[37,148],"victims.":[39],"This":[40,151],"study":[41,105],"introduces":[42],"an":[43],"innovative":[44],"approach":[45],"mitigate":[47],"risk":[49],"of":[50,68,82,96,132,141],"phishing":[51,60,101,133,142,162],"attacks":[52],"by":[53,160],"employing":[54],"machine":[55,97],"learning":[56,98],"algorithms":[57,135],"detect":[59],"URLs.":[61],"The":[62,90,130],"proposed":[63],"method":[64],"applies":[65],"suite":[67],"algorithms,":[69],"including":[70],"j48,":[71],"Na\u00efve":[72],"Bayes,":[73],"JRip,":[74],"Decision":[76],"Table,":[77],"robust":[80],"dataset":[81],"11,430":[83],"URLs,":[84],"each":[85],"with":[86],"87":[87],"extracted":[88],"features.":[89],"reveal":[92],"considerable":[94],"potential":[95,147],"identifying":[100],"threats.":[102],"Furthermore,":[103],"explores":[106],"novel":[108],"server-side":[109],"analysis":[110],"concept":[111],"where":[112],"server":[114],"scrutinizes":[115],"links":[116],"transmitted":[117],"via":[118],"emails":[119],"or":[120],"social":[121],"communication":[122],"platforms":[123],"WhatsApp,":[126],"Messenger,":[127],"Instagram.":[129],"application":[131],"detection":[134,163],"filters":[136],"prevents":[138],"delivery":[140],"links,":[143],"thus":[144],"reducing":[145],"users.":[150],"research":[152],"is":[153],"poised":[154],"significantly":[156],"contribute":[157],"cybersecurity":[159],"enhancing":[161],"mechanisms'":[164],"accuracy":[165],"efficiency.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
