{"id":"https://openalex.org/W4410768131","doi":"https://doi.org/10.1186/s42400-024-00328-3","title":"A novel Smishing defense approach based on meta-heuristic optimization algorithms","display_name":"A novel Smishing defense approach based on meta-heuristic optimization algorithms","publication_year":2025,"publication_date":"2025-05-28","ids":{"openalex":"https://openalex.org/W4410768131","doi":"https://doi.org/10.1186/s42400-024-00328-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00328-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00328-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00328-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00328-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102843496","display_name":"Mohammad Alshinwan","orcid":"https://orcid.org/0000-0002-3864-7323"},"institutions":[{"id":"https://openalex.org/I91633459","display_name":"Middle East University","ror":"https://ror.org/059bgad73","country_code":"JO","type":"education","lineage":["https://openalex.org/I91633459"]},{"id":"https://openalex.org/I146367977","display_name":"Applied Science Private University","ror":"https://ror.org/01ah6nb52","country_code":"JO","type":"education","lineage":["https://openalex.org/I146367977"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mohammad Alshinwan","raw_affiliation_strings":["Faculty of Information Technology, Applied Science Private University, Amman, 11931, Jordan","MEU Research Unit, Middle East University, Amman, 11831, Jordan"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Applied Science Private University, Amman, 11931, Jordan","institution_ids":["https://openalex.org/I146367977"]},{"raw_affiliation_string":"MEU Research Unit, Middle East University, Amman, 11831, Jordan","institution_ids":["https://openalex.org/I91633459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057174588","display_name":"Osama A. Khashan","orcid":"https://orcid.org/0000-0003-1965-1869"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Osama A. Khashan","raw_affiliation_strings":["Research and Innovation Centers, Rabdan Academy, P.O. Box 114646, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Research and Innovation Centers, Rabdan Academy, P.O. Box 114646, Abu Dhabi, United Arab Emirates","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091911941","display_name":"Zakwan Al-Arnaout","orcid":"https://orcid.org/0000-0001-8218-8630"},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Zakwan Alarnaout","raw_affiliation_strings":["College of Engineering and Technology, American University of the Middle East, Egaila, 54200, Kuwait"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Technology, American University of the Middle East, Egaila, 54200, Kuwait","institution_ids":["https://openalex.org/I2803079837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080331973","display_name":"Salam Salameh Shreem","orcid":"https://orcid.org/0000-0001-7384-9185"},"institutions":[{"id":"https://openalex.org/I183874917","display_name":"Urbana University","ror":"https://ror.org/04kp3hw27","country_code":"US","type":"education","lineage":["https://openalex.org/I183874917"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Salam Salameh Shreem","raw_affiliation_strings":["Data Science Department, HLT, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Data Science Department, HLT, Urbana, IL, USA","institution_ids":["https://openalex.org/I183874917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036747360","display_name":"Ahmed Younes Shdefat","orcid":"https://orcid.org/0000-0003-2221-2170"},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Ahmed Younes Shdefat","raw_affiliation_strings":["College of Engineering and Technology, American University of the Middle East, Egaila, 54200, Kuwait"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Technology, American University of the Middle East, Egaila, 54200, Kuwait","institution_ids":["https://openalex.org/I2803079837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042749439","display_name":"Nader Abdel Karim","orcid":null},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Nader Abdel Karim","raw_affiliation_strings":["Department of Intelligent Systems, Faculty of Artificial Intelligence, Al-Balqa Applied University, Al-Salt, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent Systems, Faculty of Artificial Intelligence, Al-Balqa Applied University, Al-Salt, Jordan","institution_ids":["https://openalex.org/I33926330"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5057174588","https://openalex.org/A5102843496"],"corresponding_institution_ids":["https://openalex.org/I146367977","https://openalex.org/I91633459"],"apc_list":null,"apc_paid":null,"fwci":1.5804,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82046342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/meta-heuristic","display_name":"Meta heuristic","score":0.6837903261184692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6232906579971313},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5318792462348938},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42712390422821045},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2014199197292328}],"concepts":[{"id":"https://openalex.org/C2988037039","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Meta heuristic","level":2,"score":0.6837903261184692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6232906579971313},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5318792462348938},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42712390422821045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2014199197292328}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00328-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00328-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00328-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:11c9520e1b0b4caf99850317213249c6","is_oa":true,"landing_page_url":"https://doaj.org/article/11c9520e1b0b4caf99850317213249c6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-27 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00328-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00328-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00328-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410768131.pdf","grobid_xml":"https://content.openalex.org/works/W4410768131.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W137636023","https://openalex.org/W1538107785","https://openalex.org/W1714665356","https://openalex.org/W1873936197","https://openalex.org/W1968955064","https://openalex.org/W1973644085","https://openalex.org/W1996756779","https://openalex.org/W2000369940","https://openalex.org/W2020228107","https://openalex.org/W2025288138","https://openalex.org/W2028223155","https://openalex.org/W2030833701","https://openalex.org/W2032793012","https://openalex.org/W2036166268","https://openalex.org/W2057340441","https://openalex.org/W2069128736","https://openalex.org/W2070896531","https://openalex.org/W2074339481","https://openalex.org/W2082336721","https://openalex.org/W2104933073","https://openalex.org/W2113449956","https://openalex.org/W2118978333","https://openalex.org/W2125011234","https://openalex.org/W2125569632","https://openalex.org/W2140910804","https://openalex.org/W2166827968","https://openalex.org/W2185620458","https://openalex.org/W2201074936","https://openalex.org/W2232618245","https://openalex.org/W2290883490","https://openalex.org/W2310347995","https://openalex.org/W2508482518","https://openalex.org/W2534990710","https://openalex.org/W2543220519","https://openalex.org/W2573137292","https://openalex.org/W2576815293","https://openalex.org/W2606751384","https://openalex.org/W2738642069","https://openalex.org/W2777584150","https://openalex.org/W2808276835","https://openalex.org/W2919979744","https://openalex.org/W2921737648","https://openalex.org/W2948024141","https://openalex.org/W2974087340","https://openalex.org/W3014974411","https://openalex.org/W3212797097","https://openalex.org/W4206702331","https://openalex.org/W4232179414","https://openalex.org/W4285492978","https://openalex.org/W4382403218"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4310120240","https://openalex.org/W3203633096"],"abstract_inverted_index":{"Abstract":[0],"Phishing":[1],"attacks":[2],"have":[3],"recently":[4],"emerged":[5],"as":[6],"one":[7],"of":[8,25,113,142,152],"the":[9,93,111,128,136,140,143,155,162,171],"most":[10],"severe":[11],"dangers":[12],"to":[13,51,126],"businesses,":[14],"Internet":[15],"users,":[16],"service":[17],"providers,":[18],"cloud":[19],"computing,":[20],"and":[21,41,74,76,90,116],"many":[22],"other":[23],"aspects":[24],"daily":[26],"life.":[27],"Most":[28],"SMS":[29,60,144,181],"phishing":[30,61,145,182],"messages":[31],"are":[32,49,107,123],"short":[33],"text":[34],"with":[35],"simple":[36],"messages,":[37],"new":[38],"writing":[39],"characteristics,":[40,154],"oversampling":[42,102],"techniques":[43],"for":[44,58,87,179],"unbalanced":[45],"data,":[46],"so":[47],"they":[48],"easy":[50],"spot.":[52],"This":[53],"paper":[54],"introduces":[55],"an":[56,101,150],"approach":[57,138],"detecting":[59],"based":[62],"on":[63],"machine":[64,83],"learning":[65],"algorithms.":[66,79],"The":[67,80,104,167],"suggested":[68,156],"system":[69],"incorporates":[70],"feature":[71,88],"extraction,":[72],"oversampling,":[73],"selection":[75],"classification":[77],"optimization":[78],"Support":[81],"vector":[82],"(SVM)":[84],"is":[85],"used":[86,125],"extraction":[89],"categorization.":[91],"Furthermore,":[92],"Adaptive":[94],"Synthetic":[95],"Sampling":[96],"Approach":[97],"technique":[98],"was":[99],"formerly":[100],"technique.":[103],"retrieved":[105],"features":[106],"then":[108,124],"analyzed":[109],"using":[110],"hybridization":[112],"Reptile":[114],"search":[115],"Prairie":[117],"Dogs":[118],"algorithms":[119],"called":[120],"(R-PDO),":[121],"which":[122],"choose":[127],"features\u2019":[129],"ideal":[130],"order.":[131],"Experimental":[132],"findings":[133,168],"show":[134,169],"that":[135,170],"R-PDO":[137],"enhances":[139],"accuracy":[141,164],"detection":[146],"system.":[147],"With":[148],"just":[149],"average":[151],"87.4":[153],"method":[157],"in":[158],"this":[159],"article":[160],"achieves":[161],"best":[163],"at":[165],"99.25%.":[166],"proposed":[172],"strategy":[173],"has":[174],"a":[175],"promising":[176],"track":[177],"record":[178],"identifying":[180],"messages.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
