{"id":"https://openalex.org/W4400424435","doi":"https://doi.org/10.32604/cmc.2024.051778","title":"Phishing Attacks Detection Using Ensemble Machine Learning Algorithms","display_name":"Phishing Attacks Detection Using Ensemble Machine Learning Algorithms","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400424435","doi":"https://doi.org/10.32604/cmc.2024.051778"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.051778","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.051778","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-1/TSP_CMC_51778/TSP_CMC_51778.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-1/TSP_CMC_51778/TSP_CMC_51778.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050280602","display_name":"Nisreen Innab","orcid":"https://orcid.org/0000-0003-4412-7727"},"institutions":[{"id":"https://openalex.org/I4391767729","display_name":"Almaarefa University","ror":"https://ror.org/00s3s5518","country_code":null,"type":"education","lineage":["https://openalex.org/I4391767729"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Nisreen Innab","raw_affiliation_strings":["Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Diriyah, Riyadh, 13713, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Diriyah, Riyadh, 13713, Saudi Arabia","institution_ids":["https://openalex.org/I4391767729"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067249651","display_name":"Ahmed Osman","orcid":"https://orcid.org/0000-0001-8453-0639"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmed Abdelgader Fadol Osman","raw_affiliation_strings":["Applied College, King Faisal University, Al-Ahsa, 31982, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Applied College, King Faisal University, Al-Ahsa, 31982, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5095656388","display_name":"Mohammed Ataelfadiel","orcid":"https://orcid.org/0009-0000-1497-4381"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Awad Mohammed Ataelfadiel","raw_affiliation_strings":["Applied College, King Faisal University, Al-Ahsa, 31982, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Applied College, King Faisal University, Al-Ahsa, 31982, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014580247","display_name":"Marwan Abu-Zanona","orcid":"https://orcid.org/0009-0004-9969-5048"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]},{"id":"https://openalex.org/I4210165529","display_name":"University of Business and Technology","ror":"https://ror.org/05tcr1n44","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210165529"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Marwan Abu-Zanona","raw_affiliation_strings":["Department of Management Information Systems, College of Business Administration, King Faisal University, Al-Ahsa, 31982, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, College of Business Administration, King Faisal University, Al-Ahsa, 31982, Saudi Arabia","institution_ids":["https://openalex.org/I4626487","https://openalex.org/I4210165529"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052533440","display_name":"Bassam Mohammad Elzaghmouri","orcid":null},"institutions":[{"id":"https://openalex.org/I48714440","display_name":"Jerash University","ror":"https://ror.org/047mw5m74","country_code":"JO","type":"education","lineage":["https://openalex.org/I48714440"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bassam Mohammad Elzaghmouri","raw_affiliation_strings":["Department of Computer Science, Faculty of Computer Science and Information Technology, Jerash University, Jerash, 26110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computer Science and Information Technology, Jerash University, Jerash, 26110, Jordan","institution_ids":["https://openalex.org/I48714440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109817518","display_name":"Farah H. Zawaideh","orcid":null},"institutions":[{"id":"https://openalex.org/I97864281","display_name":"Irbid National University","ror":"https://ror.org/00xfxvy87","country_code":"JO","type":"education","lineage":["https://openalex.org/I97864281"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Farah H. Zawaideh","raw_affiliation_strings":["Department of Business Intelligence and Data Analysis, Faculty of Financial Sciences and Business, Irbid National University, Irbid, 21110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Business Intelligence and Data Analysis, Faculty of Financial Sciences and Business, Irbid National University, Irbid, 21110, Jordan","institution_ids":["https://openalex.org/I97864281"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114188359","display_name":"Mouiad Fadeil Alawneh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117471","display_name":"Ajloun National University","ror":"https://ror.org/01m28kg79","country_code":"JO","type":"education","lineage":["https://openalex.org/I4210117471"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mouiad Fadeil Alawneh","raw_affiliation_strings":["Faculty of Information Technology, Ajloun National University, Ajloun, 26767, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Ajloun National University, Ajloun, 26767, Jordan","institution_ids":["https://openalex.org/I4210117471"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5050280602"],"corresponding_institution_ids":["https://openalex.org/I4391767729"],"apc_list":null,"apc_paid":null,"fwci":12.6416,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.98588234,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"80","issue":"1","first_page":"1325","last_page":"1345"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.717005729675293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6527091264724731},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5307897329330444},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4916279911994934},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4503468871116638},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36471283435821533},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09992274641990662},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09973412752151489}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.717005729675293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527091264724731},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5307897329330444},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4916279911994934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4503468871116638},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36471283435821533},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09992274641990662},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09973412752151489}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.051778","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.051778","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-1/TSP_CMC_51778/TSP_CMC_51778.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.051778","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.051778","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-1/TSP_CMC_51778/TSP_CMC_51778.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400424435.pdf"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W2002964284","https://openalex.org/W2891171053","https://openalex.org/W2946987024","https://openalex.org/W2966241529","https://openalex.org/W2983291275","https://openalex.org/W2989868186","https://openalex.org/W2990623250","https://openalex.org/W3025204993","https://openalex.org/W3034223370","https://openalex.org/W3037374573","https://openalex.org/W3080664025","https://openalex.org/W3080816325","https://openalex.org/W3093469966","https://openalex.org/W3112545613","https://openalex.org/W3117342765","https://openalex.org/W3139008799","https://openalex.org/W3139151242","https://openalex.org/W3173978539","https://openalex.org/W3197944870","https://openalex.org/W4200605714","https://openalex.org/W4283747666","https://openalex.org/W4285765434","https://openalex.org/W4287664140","https://openalex.org/W4287775004","https://openalex.org/W4294486857","https://openalex.org/W4318816041","https://openalex.org/W4382990228","https://openalex.org/W4384469965","https://openalex.org/W4385399585","https://openalex.org/W4388668471","https://openalex.org/W4390643523","https://openalex.org/W6651331017","https://openalex.org/W6762797091","https://openalex.org/W6766326518","https://openalex.org/W6769784449","https://openalex.org/W6770509066","https://openalex.org/W6779599403","https://openalex.org/W6782149859","https://openalex.org/W6784602601","https://openalex.org/W6787503265","https://openalex.org/W6797751527","https://openalex.org/W6800836081","https://openalex.org/W6853928343","https://openalex.org/W7067744849"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Phishing,":[0],"an":[1,92],"Internet":[2],"fraud":[3],"where":[4],"individuals":[5],"are":[6,37,151],"deceived":[7],"into":[8,139],"revealing":[9],"critical":[10],"personal":[11],"and":[12,22,70,95,109,163,206,271],"account":[13],"information,":[14],"poses":[15],"a":[16,27,64,262,267,272],"significant":[17],"risk":[18],"to":[19,47,53,57,103,131],"both":[20],"consumers":[21],"web-based":[23],"institutions.":[24],"Data":[25],"indicates":[26,237],"persistent":[28],"rise":[29],"in":[30,83,154,221,232,255],"phishing":[31,85,119,257],"attacks.":[32],"Moreover,":[33],"these":[34,72],"fraudulent":[35],"schemes":[36],"progressively":[38],"becoming":[39],"more":[40,45],"intricate,":[41],"thereby":[42],"rendering":[43],"them":[44,241],"challenging":[46],"identify.":[48],"Hence,":[49],"it":[50,97,111],"is":[51,63,112],"imperative":[52],"utilize":[54],"sophisticated":[55],"algorithms":[56,150,227],"address":[58],"this":[59,88,146,249],"issue.":[60],"Machine":[61,75],"learning":[62,76,101],"highly":[65],"effective":[66],"approach":[67,94,250],"for":[68,148],"identifying":[69],"uncovering":[71],"harmful":[73],"behaviors.":[74],"(ML)":[77],"approaches":[78],"can":[79,242],"identify":[80],"common":[81],"characteristics":[82],"most":[84],"assaults.":[86],"In":[87],"paper,":[89],"we":[90,123],"propose":[91],"ensemble":[93],"compare":[96],"with":[98,259],"six":[99],"machine":[100],"techniques":[102],"determine":[104],"the":[105,125,129,133,137,140,155,213,217,222,226,229,245,252],"type":[106],"of":[107,135,145,240],"website":[108],"whether":[110],"normal":[113],"or":[114],"not":[115],"based":[116,158],"on":[117,128,159],"two":[118],"datasets.":[120],"After":[121],"that,":[122],"used":[124],"normalization":[126],"technique":[127],"dataset":[130,157],"transform":[132],"range":[134],"all":[136,149,225],"features":[138],"same":[141,230],"range.":[142],"The":[143],"findings":[144],"paper":[147],"as":[152],"follows":[153],"first":[156],"accuracy,":[160,261],"precision,":[161],"recall,":[162],"F1-score,":[164],"respectively:":[165],"Decision":[166],"Tree":[167],"(DT)":[168],"(0.964,":[169],"0.961,":[170],"0.976,":[171,190,191,204],"0.968),":[172],"Random":[173],"Forest":[174],"(RF)":[175],"(0.970,":[176,202],"0.964,":[177],"0.984,":[178],"0.974),":[179],"Gradient":[180],"Boosting":[181],"(GB)":[182],"(0.960,":[183],"0.959,":[184],"0.971,":[185,203],"0.965),":[186],"XGBoost":[187],"(XGB)":[188],"(0.973,":[189],"0.976),":[192],"AdaBoost":[193],"(0.934,":[194],"0.934,":[195],"0.950,":[196],"0.942),":[197],"Multi":[198],"Layer":[199],"Perceptron":[200],"(MLP)":[201],"0.974)":[205],"Voting":[207,214],"(0.978,":[208],"0.975,":[209],"0.987,":[210],"0.981).":[211],"So,":[212],"classifier":[215],"gave":[216,228],"best":[218],"results.":[219],"While":[220],"second":[223],"dataset,":[224],"results":[231],"four":[233],"evaluation":[234],"metrics,":[235],"which":[236],"that":[238],"each":[239],"effectively":[243],"accomplish":[244],"prediction":[246,269],"process.":[247],"Also,":[248],"outperformed":[251],"previous":[253],"work":[254],"detecting":[256],"websites":[258],"high":[260],"lower":[263,273],"false":[264,274],"negative":[265],"rate,":[266],"shorter":[268],"time,":[270],"positive":[275],"rate.":[276]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
