{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:49:57Z","timestamp":1769838597734,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:00:00Z","timestamp":1765497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:00:00Z","timestamp":1765497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00500-025-10972-7","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T10:00:20Z","timestamp":1765533620000},"page":"581-592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effective phishing website detection using CNN and SVM with adaptive hyperparameter optimization via BAT algorithms"],"prefix":"10.1007","volume":"30","author":[{"given":"Santosh Kumar","family":"Birthriya","sequence":"first","affiliation":[]},{"given":"Priyanka","family":"Ahlawat","sequence":"additional","affiliation":[]},{"given":"Ankit Kumar","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"10972_CR1","doi-asserted-by":"publisher","unstructured":"Abedin NF, Bawm R, Sarwar T, Saifuddin M, Rahman MA, Hossain S (2020) Phishing attack detection using machine learning classification techniques. In: Proceedings of the 3rd International Conference on Intelligent Sustainable Systems. ICISS 2020, pp 1125\u20131130. https:\/\/doi.org\/10.1109\/ICISS49785.2020.9315895","DOI":"10.1109\/ICISS49785.2020.9315895"},{"issue":"12","key":"10972_CR2","doi-asserted-by":"publisher","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","volume":"37","author":"M Aburrous","year":"2010","unstructured":"Aburrous M, Hossain MA, Dahal K, Thabtah F (2010) Intelligent phishing detection system for e-banking using fuzzy data mining. Expert Syst Appl 37(12):7913\u20137921","journal-title":"Expert Syst Appl"},{"key":"10972_CR3","doi-asserted-by":"crossref","unstructured":"Afroz S, Greenstadt R (2011) Phishzoo: Detecting phishing websites by looking at them. In: Semantic computing (ICSC), 2011 5th IEEE international conference on. IEEE, pp 368\u2013375","DOI":"10.1109\/ICSC.2011.52"},{"key":"10972_CR4","doi-asserted-by":"publisher","first-page":"116766","DOI":"10.1109\/ACCESS.2020.3003569","volume":"8","author":"W Ali","year":"2020","unstructured":"Ali W, Malebary S (2020) Particle swarm optimization-based feature weighting for improving intelligent phishing website detection. IEEE Access 8:116766\u2013116780","journal-title":"IEEE Access"},{"issue":"1","key":"10972_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.297032","volume":"18","author":"A Almomani","year":"2022","unstructured":"Almomani A, Alauthman M, Shatnawi MT, Alweshah M, Alrosan A, Alomoush W, Gupta BB (2022) Phishing website detection with semantic features based on machine learning classifiers: a comparative study. Int J Semant Web Inf Syst 18(1):1\u201324","journal-title":"Int J Semant Web Inf Syst"},{"issue":"29","key":"10972_CR6","doi-asserted-by":"publisher","first-page":"44943","DOI":"10.1007\/s11042-023-15399-6","volume":"82","author":"TR Alsenani","year":"2023","unstructured":"Alsenani TR, Ayon SI, Yousuf SM, Anik FBK, Chowdhury MES (2023) Intelligent feature selection model based on particle swarm optimization to detect phishing websites. Multimedia Tools Appl 82(29):44943\u201344975","journal-title":"Multimedia Tools Appl"},{"key":"10972_CR7","unstructured":"Anti Phishing Working Group (2024) Phishing activity trends report: 1st quarter 2023 to 2nd quarter 2024"},{"issue":"1","key":"10972_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11235-020-00739-w","volume":"76","author":"S Anupam","year":"2021","unstructured":"Anupam S, Kar AK (2021) Phishing website detection using support vector machines and nature-inspired optimization algorithms. Telecommun Syst 76(1):17\u201332","journal-title":"Telecommun Syst"},{"issue":"6","key":"10972_CR9","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E (2023) A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6):1333","journal-title":"Electronics"},{"issue":"12","key":"10972_CR11","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s00500-018-3084-2","volume":"23","author":"M Babagoli","year":"2019","unstructured":"Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23(12):4315\u20134327","journal-title":"Soft Comput"},{"issue":"11","key":"10972_CR12","doi-asserted-by":"publisher","first-page":"4697","DOI":"10.1016\/j.eswa.2013.02.009","volume":"40","author":"PA Barraclough","year":"2013","unstructured":"Barraclough PA, Hossain MA, Tahir M, Sexton G, Aslam N (2013) Intelligent phishing detection and protection scheme for online transactions. Expert Syst Appl 40(11):4697\u20134706","journal-title":"Expert Syst Appl"},{"key":"10972_CR13","doi-asserted-by":"publisher","unstructured":"Basit A, Zafar M, Javed AR, Jalil Z (2020) A novel ensemble machine learning method to detect phishing attack. In: Proceedings \u2013\u20092020 23rd IEEE International Multi-Topic Conference INMIC 2020. https:\/\/doi.org\/10.1109\/INMIC50486.2020.9318210","DOI":"10.1109\/INMIC50486.2020.9318210"},{"issue":"6","key":"10972_CR14","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1016\/j.ipm.2016.04.009","volume":"52","author":"M Chakraborty","year":"2016","unstructured":"Chakraborty M, Pal S, Pramanik R, Chowdary CR (2016) Recent developments in social spam detection and combating techniques: a survey. Inf Process Manag 52(6):1053\u20131073","journal-title":"Inf Process Manag"},{"key":"10972_CR15","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew KL, Tan CL, Wong K, Yong KS, Tiong WK (2019) A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf Sci 484:153\u2013166","journal-title":"Inf Sci"},{"key":"10972_CR16","doi-asserted-by":"publisher","unstructured":"Deshpande KV, Singh J (2025) A systematic review on website phishing attack detection for online users. Int J Image Graphics 2750013. https:\/\/doi.org\/10.1142\/S0219467827500136","DOI":"10.1142\/S0219467827500136"},{"key":"10972_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2023.103056","volume":"176","author":"G Desolda","year":"2023","unstructured":"Desolda G, Aneke J, Ardito C, Lanzilotti R, Costabile MF (2023) Explanations in warning dialogs to help users defend against phishing attacks. Int J Hum Comput Studies 176:103056. https:\/\/doi.org\/10.1016\/j.ijhcs.2023.103056","journal-title":"Int J Hum Comput Studies"},{"issue":"4","key":"10972_CR18","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"AY Fu","year":"2006","unstructured":"Fu AY, Wenyin L, Deng X (2006) Detecting phishing web pages with visual similarity assessment based on Earth mover\u2019sdistance (EMD). IEEE Trans Dependable Secure Comput 3(4):301\u2013311","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"10972_CR19","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1007\/s11831-021-09624-4","volume":"29","author":"S Ghafori","year":"2022","unstructured":"Ghafori S, Gharehchopogh FS (2022) Advances in spotted hyena optimizer: a comprehensive survey. Arch Comput Methods Eng 29(3):1569\u20131590","journal-title":"Arch Comput Methods Eng"},{"key":"10972_CR20","doi-asserted-by":"crossref","unstructured":"Hara M, Yamada A, Miyake Y (2009) Visual similarity based phishing detection without victim site information. In: Computational intelligence in cyber security, 2009. CICS\u201909. IEEE symposium on. IEEE, pp 30\u201336","DOI":"10.1109\/CICYBS.2009.4925087"},{"key":"10972_CR21","doi-asserted-by":"crossref","unstructured":"Kabir MWU, Sakib N, Chowdhury SMR, Alam MS (2014) A novel adaptive bat algorithm to control explorations and exploitations for continuous optimization problems. Int J Comput Appl 94(13).","DOI":"10.5120\/16402-6079"},{"issue":"3","key":"10972_CR22","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1016\/j.eswa.2014.08.046","volume":"42","author":"HB Kazemian","year":"2015","unstructured":"Kazemian HB, Ahmed S (2015) Comparisons of machine learning techniques for detecting malicious webpages. Expert Syst Appl 42(3):1166\u20131177","journal-title":"Expert Syst Appl"},{"key":"10972_CR23","doi-asserted-by":"publisher","first-page":"3129","DOI":"10.1016\/j.matpr.2021.07.178","volume":"80","author":"PP Kumar","year":"2023","unstructured":"Kumar PP, Jaya T, Rajendran V (2023) SI-BBA\u2013A novel phishing website detection based on Swarm intelligence with deep learning. Mater Today Proc 80:3129\u20133139","journal-title":"Mater Today Proc"},{"key":"10972_CR24","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chemolab.2015.08.020","volume":"149","author":"F Marini","year":"2015","unstructured":"Marini F, Walczak B (2015) Particle swarm optimization (PSO). A tutorial. Chemometr Intell Lab Syst 149:153\u2013165","journal-title":"Chemometr Intell Lab Syst"},{"key":"10972_CR25","doi-asserted-by":"crossref","unstructured":"Medvet E, Kirda E, Kruegel C (2008) Visual-similarity based phishing detection. In: Proceedings of the 4th international conference on security and privacy in communication networks. ACM, p 22","DOI":"10.1145\/1460877.1460905"},{"issue":"22","key":"10972_CR26","doi-asserted-by":"publisher","first-page":"14429","DOI":"10.1007\/s00500-021-06230-1","volume":"25","author":"PE Mergos","year":"2021","unstructured":"Mergos PE, Yang XS (2021) Flower pollination algorithm parameters tuning. Soft Comput 25(22):14429\u201314447","journal-title":"Soft Comput"},{"issue":"2","key":"10972_CR27","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014) Predicting phishing websites based on self-structuring neural network. Neural Comput Appl 25(2):443\u2013458","journal-title":"Neural Comput Appl"},{"issue":"7","key":"10972_CR28","doi-asserted-by":"publisher","first-page":"4113","DOI":"10.1007\/s11831-023-09928-7","volume":"30","author":"MH Nadimi-Shahraki","year":"2023","unstructured":"Nadimi-Shahraki MH, Zamani H, Asghari Varzaneh Z, Mirjalili S (2023) A systematic review of the whale optimization algorithm: theoretical foundation, improvements, and hybridizations. Arch Comput Methods Eng 30(7):4113\u20134159","journal-title":"Arch Comput Methods Eng"},{"key":"10972_CR29","doi-asserted-by":"crossref","unstructured":"Naidu G, Zuva T, Sibanda EM (2023) A review of evaluation metrics in machine learning algorithms. In: Computer science on-line conference. Springer International Publishing,\u00a0Cham, pp 15\u201325","DOI":"10.1007\/978-3-031-35314-7_2"},{"issue":"7","key":"10972_CR30","doi-asserted-by":"publisher","first-page":"5501","DOI":"10.1007\/s00521-022-07957-0","volume":"35","author":"NS Nordin","year":"2023","unstructured":"Nordin NS, Ismail MA (2023) A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection. Neural Comput Appl 35(7):5501\u20135512","journal-title":"Neural Comput Appl"},{"key":"10972_CR32","doi-asserted-by":"crossref","unstructured":"Pan Y, Ding X (2006) Anomaly based web phishing page detection. In: 2006 22nd annual computer security applications conference (ACSAC\u201906), pp 381\u2013392","DOI":"10.1109\/ACSAC.2006.13"},{"key":"10972_CR33","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"RS Rao","year":"2019","unstructured":"Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31:3851\u20133873","journal-title":"Neural Comput Appl"},{"key":"10972_CR34","doi-asserted-by":"publisher","unstructured":"Saha I, Sarma D, Chakma RJ, Alam MN, Sultana A, Hossain S (2020) Phishing attacks detection using machine learning approach. In: Proceedings of the 3rd International Conference on Smart Systems and Inventive Technology, ICSSIT 2020. Icssit, pp 1180\u20131185. https:\/\/doi.org\/10.1109\/ICSSIT48917.2020.9214132","DOI":"10.1109\/ICSSIT48917.2020.9214132"},{"key":"10972_CR35","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz OK, Buber E, Demir O, Diri B (2019) Machine learning based phishing detection from urls. Expert Syst Appl 117:345\u2013357","journal-title":"Expert Syst Appl"},{"key":"10972_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3561237","author":"JH Setu","year":"2025","unstructured":"Setu JH, Halder N, Islam A, Amin MA (2025) RSTHFS: a rough set theory-based hybrid feature selection method for phishing website classification. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2025.3561237","journal-title":"IEEE Access"},{"issue":"2","key":"10972_CR37","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s11831-022-09817-5","volume":"30","author":"M Shehab","year":"2023","unstructured":"Shehab M, Abu-Hashem MA, Shambour MKY, Alsalibi AI, Alomari OA, Gupta JN, Abualigah L (2023) A comprehensive review of bat inspired algorithm: variants, applications, and hybridization. Arch Comput Methods Eng 30(2):765\u2013797","journal-title":"Arch Comput Methods Eng"},{"key":"10972_CR38","doi-asserted-by":"crossref","unstructured":"Shreeram V, Suban M, Shanthi P, Manjula K (2010) Antiphishing detection of phishing attacks using genetic algorithm. In: Communication control and computing technologies (ICCCCT), 2010 IEEE international conference on. IEEE, pp 447\u2013450","DOI":"10.1109\/ICCCCT.2010.5670593"},{"key":"10972_CR39","doi-asserted-by":"publisher","first-page":"333","DOI":"10.3103\/S0146411619040102","volume":"53","author":"MT Suleman","year":"2019","unstructured":"Suleman MT, Awan SM (2019) Optimization of URL-based phishing websites detection through genetic algorithms. Autom Control Comput Sci 53:333\u2013341","journal-title":"Autom Control Comput Sci"},{"key":"10972_CR40","doi-asserted-by":"crossref","unstructured":"Tang L, Mahmoud QH (2025) A lightweight heuristic method for phishing website detection. In:\u00a0International conference on intelligent and fuzzy systems.\u00a0Springer Nature Switzerland,\u00a0Cham, pp 382\u2013393","DOI":"10.1007\/978-3-031-97992-7_43"},{"issue":"13","key":"10972_CR41","doi-asserted-by":"publisher","first-page":"7983","DOI":"10.1007\/s00500-024-09761-5","volume":"28","author":"SU Umar","year":"2024","unstructured":"Umar SU, Rashid TA, Ahmed AM, Hassan BA, Baker MR (2024) Modified bat algorithm: a newly proposed approach for solving complex and real-world problems. Soft Comput 28(13):7983\u20137998","journal-title":"Soft Comput"},{"key":"10972_CR42","doi-asserted-by":"crossref","unstructured":"Wang X, Wang W, Wang Y (2013) An adaptive bat algorithm. In: International conference on intelligent computing. Springer Berlin Heidelberg,\u00a0Berlin, Heidelberg, pp 216\u2013223","DOI":"10.1007\/978-3-642-39482-9_25"},{"key":"10972_CR43","doi-asserted-by":"crossref","unstructured":"Wenyin L, Huang G, Xiaoyue L, Min Z, Deng X (2005) Detection of phishing webpages based on visual similarity. In: Special interest tracks and posters of the 14th international conference on world wide web. ACM, pp 1060\u20131061","DOI":"10.1145\/1062745.1062868"},{"issue":"5","key":"10972_CR44","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1007\/s42235-023-00386-2","volume":"20","author":"M Zare","year":"2023","unstructured":"Zare M, Ghasemi M, Zahedi A, Golalipour K, Mohammadi SK, Mirjalili S, Abualigah L (2023) A global best-guided firefly algorithm for engineering problems. J Bionic Eng 20(5):2359\u20132388","journal-title":"J Bionic Eng"},{"key":"10972_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111303","volume":"265","author":"Z Zhang","year":"2025","unstructured":"Zhang Z, Wu J, Lu N, Shi W, Liu Z (2025) Adaptpud: an accurate URL-based detection approach against tailored deceptive phishing websites. Comput Networks 265:111303","journal-title":"Comput Networks"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10972-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10972-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10972-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T15:55:19Z","timestamp":1769788519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10972-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,12]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10972"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10972-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,12]]},"assertion":[{"value":"8 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest in this field.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies involving human participants or animals conducted by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}