{"id":"https://openalex.org/W7139027827","doi":"https://doi.org/10.23919/icact68090.2026.11431525","title":"A Hybrid Approach to Phishing URL Detection Using Bidirectional LSTM and Evolutionary-Spider Wasp Optimization","display_name":"A Hybrid Approach to Phishing URL Detection Using Bidirectional LSTM and Evolutionary-Spider Wasp Optimization","publication_year":2026,"publication_date":"2026-02-08","ids":{"openalex":"https://openalex.org/W7139027827","doi":"https://doi.org/10.23919/icact68090.2026.11431525"},"language":null,"primary_location":{"id":"doi:10.23919/icact68090.2026.11431525","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact68090.2026.11431525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 28th International Conference on Advanced Communications Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101730228","display_name":"Indu Singh","orcid":"https://orcid.org/0000-0002-9038-4364"},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Indu Singh","raw_affiliation_strings":["Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102733385","display_name":"Ayush Srivastava","orcid":"https://orcid.org/0000-0003-1713-8893"},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ayush Srivastava","raw_affiliation_strings":["Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120787496","display_name":"Arjun Vir Vashisht","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arjun Vir Vashisht","raw_affiliation_strings":["Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129850512","display_name":"Karan","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Karan","raw_affiliation_strings":["Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130024302","display_name":"Md Anas","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Md Anas","raw_affiliation_strings":["Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India"],"affiliations":[{"raw_affiliation_string":"Delhi Technological University,Department of Computer Science and Engineering,New Delhi,India","institution_ids":["https://openalex.org/I863896202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101730228"],"corresponding_institution_ids":["https://openalex.org/I863896202"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94349843,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"316","last_page":"322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7166000008583069},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.635699987411499},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5972999930381775},{"id":"https://openalex.org/keywords/metaheuristic","display_name":"Metaheuristic","score":0.5715000033378601},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5609999895095825},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5059000253677368},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4311999976634979},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.42829999327659607},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.4235999882221222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983999848365784},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7166000008583069},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6486999988555908},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.635699987411499},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6140999794006348},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5972999930381775},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.5715000033378601},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5609999895095825},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5067999958992004},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5059000253677368},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4311999976634979},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.42829999327659607},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4235999882221222},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.41280001401901245},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4099999964237213},{"id":"https://openalex.org/C126980161","wikidata":"https://www.wikidata.org/wiki/Q863783","display_name":"Simulated annealing","level":2,"score":0.3921000063419342},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3628999888896942},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2662999927997589},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact68090.2026.11431525","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact68090.2026.11431525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 28th International Conference on Advanced Communications Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1570802690","https://openalex.org/W1970174926","https://openalex.org/W2111885992","https://openalex.org/W2131774270","https://openalex.org/W2146729596","https://openalex.org/W2890718808","https://openalex.org/W2912999925","https://openalex.org/W4226443146","https://openalex.org/W4289926728","https://openalex.org/W4291803530","https://openalex.org/W4312775392","https://openalex.org/W4360980642","https://openalex.org/W4372260394","https://openalex.org/W4383098230","https://openalex.org/W4386920804","https://openalex.org/W4388048245","https://openalex.org/W4391171631","https://openalex.org/W4402897232","https://openalex.org/W4403678497","https://openalex.org/W4406322582"],"related_works":[],"abstract_inverted_index":{"Phishing":[0],"attacks":[1],"are":[2,81,111],"a":[3,48,115,132,183,188],"major":[4],"cybersecurity":[5],"threat,":[6],"often":[7],"relying":[8],"on":[9,68,167],"misleading":[10],"URLs":[11],"to":[12,98,121],"deceive":[13],"users":[14],"into":[15,114],"sharing":[16],"confidential":[17],"information.":[18],"This":[19,71,147],"research":[20],"introduces":[21],"an":[22,178,194],"innovative":[23],"hybrid":[24,133],"approach":[25,148,176],"for":[26,34,83,216],"detecting":[27],"phishing":[28,219],"URLs,":[29],"combining":[30],"deep":[31,100],"learning":[32,86],"techniques":[33],"extracting":[35],"temporal":[36,101,109],"features":[37,80],"with":[38,47],"advanced":[39],"metaheuristic":[40,134],"optimization":[41],"strategies.":[42],"The":[43,202],"proposed":[44,175,211],"method":[45],"initiates":[46],"robust":[49],"multi-stage":[50],"feature":[51,60,69,106,151],"selection":[52,152],"strategy,":[53],"which":[54],"includes":[55],"mutual":[56],"information":[57],"filtering,":[58],"recursive":[59],"elimination,":[61],"model-driven":[62],"importance":[63],"ranking,":[64],"and":[65,78,142,153,159,193,207],"pruning":[66],"based":[67],"correlation.":[70],"ensures":[72],"that":[73,137,173],"only":[74],"the":[75,84,104,123,162,168,205,210],"most":[76],"significant":[77],"non-overlapping":[79],"chosen":[82],"subsequent":[85],"process.":[87],"A":[88],"Bidirectional":[89],"Long":[90],"ShortTerm":[91],"Memory":[92],"(BiLSTM)":[93],"network":[94],"is":[95],"then":[96],"applied":[97],"extract":[99],"representations":[102],"from":[103],"preprocessed":[105],"vectors.":[107],"These":[108],"embeddings":[110],"subsequently":[112],"fed":[113],"Support":[116],"Vector":[117],"Machine":[118],"(SVM)":[119],"classifier":[120],"perform":[122],"final":[124],"prediction.":[125],"To":[126],"improve":[127],"classification":[128],"accuracy,":[129],"we":[130],"introduce":[131],"approach,":[135],"hEVOSWO,":[136],"combines":[138],"Evolutionary":[139],"Optimization":[140,145],"(EVO)":[141],"Spider":[143],"Wasp":[144],"(SWO).":[146],"simultaneously":[149],"optimizes":[150],"SVM":[154],"hyperparameters,":[155],"enabling":[156],"efficient":[157],"exploration":[158],"fine-tuning":[160],"within":[161],"search":[163],"space.":[164],"Experimental":[165],"results":[166],"benchmark":[169],"ISCX-URL2016":[170],"dataset":[171],"demonstrate":[172],"our":[174],"achieves":[177],"accuracy":[179],"of":[180,185,190,199,209],"97.31":[181],"%,":[182,187,192],"precision":[184],"97.42":[186],"recall":[189],"97.18":[191],"<tex":[195],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[196],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{F":[197],"1}$</tex>-score":[198],"97.30":[200],"%.":[201],"findings":[203],"confirm":[204],"efficiency":[206],"robustness":[208],"framework,":[212],"highlighting":[213],"its":[214],"potential":[215],"advancing":[217],"resilient":[218],"detection":[220],"systems.":[221]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
