{"id":"https://openalex.org/W4404301041","doi":"https://doi.org/10.32604/cmc.2024.057279","title":"Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT","display_name":"Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404301041","doi":"https://doi.org/10.32604/cmc.2024.057279"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.057279","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057279","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57279/TSP_CMC_57279.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57279/TSP_CMC_57279.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002227435","display_name":"Arar Al Tawil","orcid":"https://orcid.org/0000-0002-3194-1407"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Arar Al Tawil","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066461201","display_name":"Laiali Almazaydeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Laiali Almazaydeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035973273","display_name":"Doaa Qawasmeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Doaa Qawasmeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114615924","display_name":"Baraah Qawasmeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baraah Qawasmeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102843496","display_name":"Mohammad Alshinwan","orcid":"https://orcid.org/0000-0002-3864-7323"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad Alshinwan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5070765307","display_name":"Khaled Elleithy","orcid":"https://orcid.org/0000-0001-9239-5035"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khaled Elleithy","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5002227435"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":18.9531,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.99275914,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"81","issue":"2","first_page":"3395","last_page":"3412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8542066216468811},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.7828390598297119},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7355021238327026},{"id":"https://openalex.org/keywords/tf\u2013idf","display_name":"tf\u2013idf","score":0.6279585361480713},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44921329617500305},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42734023928642273},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3831220865249634},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36230242252349854},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.261461079120636},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16788479685783386}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8542066216468811},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.7828390598297119},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7355021238327026},{"id":"https://openalex.org/C81758059","wikidata":"https://www.wikidata.org/wiki/Q796584","display_name":"tf\u2013idf","level":3,"score":0.6279585361480713},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44921329617500305},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42734023928642273},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3831220865249634},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36230242252349854},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.261461079120636},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16788479685783386},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.057279","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057279","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57279/TSP_CMC_57279.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.057279","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057279","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57279/TSP_CMC_57279.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404301041.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W2330219538","https://openalex.org/W2612270532","https://openalex.org/W2891171053","https://openalex.org/W2896457183","https://openalex.org/W2965373594","https://openalex.org/W2975059944","https://openalex.org/W2978017171","https://openalex.org/W2990623250","https://openalex.org/W3025204993","https://openalex.org/W3034223370","https://openalex.org/W3080664025","https://openalex.org/W3103769626","https://openalex.org/W3117342765","https://openalex.org/W3139008799","https://openalex.org/W3139151242","https://openalex.org/W3175170601","https://openalex.org/W3197944870","https://openalex.org/W4283747666","https://openalex.org/W4318816041","https://openalex.org/W4362589072","https://openalex.org/W4366826981","https://openalex.org/W4391592188","https://openalex.org/W6636510571","https://openalex.org/W6651331017","https://openalex.org/W6745106065","https://openalex.org/W6755964857","https://openalex.org/W6762797091","https://openalex.org/W6779599403","https://openalex.org/W6784602601","https://openalex.org/W6787503265","https://openalex.org/W6797751527"],"related_works":["https://openalex.org/W2903145235","https://openalex.org/W4226211987","https://openalex.org/W2574070988","https://openalex.org/W2913738019","https://openalex.org/W2580878117","https://openalex.org/W2747336051","https://openalex.org/W2208234687","https://openalex.org/W2999349876","https://openalex.org/W3070760781","https://openalex.org/W4388039896"],"abstract_inverted_index":{"Cybercriminals":[0],"often":[1],"use":[2],"fraudulent":[3],"emails":[4],"and":[5,32],"fictitious":[6],"email":[7],"accounts":[8],"to":[9],"deceive":[10],"individuals":[11],"into":[12],"disclosing":[13],"confidential":[14],"information,":[15],"a":[16],"practice":[17],"known":[18],"as":[19],"phishing.":[20],"This":[21],"study":[22],"utilizes":[23],"three":[24],"distinct":[25],"methodologies,":[26],"Term":[27],"Fr...":[28],"|":[29],"Find,":[30],"read":[31],"cite":[33],"all":[34],"the":[35],"research":[36],"you":[37],"need":[38],"on":[39],"Tech":[40],"Science":[41],"Press":[42]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
