{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:55:59Z","timestamp":1774367759235,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00778-9","type":"journal-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T20:02:50Z","timestamp":1700596970000},"page":"1055-1076","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7937-128X","authenticated-orcid":false,"given":"Subhash","family":"Ariyadasa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4538-4883","authenticated-orcid":false,"given":"Shantha","family":"Fernando","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2621-5291","authenticated-orcid":false,"given":"Subha","family":"Fernando","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"778_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106, 1\u201320 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.03.050","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"778_CR2","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1109\/comst.2017.2752087","volume":"19","author":"Z Dou","year":"2017","unstructured":"Dou, Z., Khalil, I., Khreishah, A., Al-Fuqaha, A., Guizani, M.: Systematization of knowledge (SoK): a systematic review of software-based web phishing detection. IEEE Commun. Surv. Tutor. 19(4), 2797\u20132819 (2017). https:\/\/doi.org\/10.1109\/comst.2017.2752087","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"778_CR3","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity: Enisa threat landscape report 2018: 15 top cyber threats and trends. Technical report (2019). https:\/\/doi.org\/10.2824\/622757","DOI":"10.2824\/622757"},{"key":"778_CR4","unstructured":"APWG: Phishing activity trends report: 4th quarter 2021. Technical report, Anti-Phishing Working Group (2022)"},{"key":"778_CR5","doi-asserted-by":"publisher","unstructured":"Huang, H., Zhong, S., Tan, J.: Browser-side countermeasures for deceptive phishing attack. In: 2009 Fifth International Conference on Information Assurance and Security, vol. 1, pp. 352\u2013355 (2009). https:\/\/doi.org\/10.1109\/IAS.2009.12","DOI":"10.1109\/IAS.2009.12"},{"key":"778_CR6","doi-asserted-by":"publisher","unstructured":"Yu, W.D., Nargundkar, S., Tiruthani, N.: A phishing vulnerability analysis of web based systems. In: 2008 IEEE Symposium on Computers and Communications, pp. 326\u2013331 (2008). https:\/\/doi.org\/10.1109\/ISCC.2008.4625681","DOI":"10.1109\/ISCC.2008.4625681"},{"key":"778_CR7","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060","author":"Z Alkhalil","year":"2021","unstructured":"Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. (2021). https:\/\/doi.org\/10.3389\/fcomp.2021.563060","journal-title":"Front. Comput. Sci."},{"key":"778_CR8","unstructured":"Oest, A., Zhang, P., Wardman, B., Nunes, E., Burgis, J., Zand, A., Thomas, K., Doup\u00b4e, A., Ahn, G.-J.: Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In: 29th {USENIX} Security Symposium ({USENIX} Security 20) (2020)"},{"key":"778_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","volume":"94","author":"Y Li","year":"2019","unstructured":"Li, Y., Yang, Z., Chen, X., Yuan, H., Liu, W.: A stacking model using URL and HTML features for phishing webpage detection. Futur. Gener. Comput. Syst. 94, 27\u201339 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.11.004","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"778_CR10","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/surv.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091\u20132121 (2013). https:\/\/doi.org\/10.1109\/surv.2013.032213.00009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"778_CR11","doi-asserted-by":"publisher","unstructured":"Bahnsen, A.C., Bohorquez, E.C., Villegas, S., Vargas, J., Gonz\u00b4alez, F.A.: Classifying phishing urls using recurrent neural networks. In: 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u20138 (2017). https:\/\/doi.org\/10.1109\/ECRIME.2017.7945048","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"778_CR12","doi-asserted-by":"publisher","first-page":"221214","DOI":"10.1109\/access.2020.3043188","volume":"8","author":"J Feng","year":"2020","unstructured":"Feng, J., Zou, L., Ye, O., Han, J.: Web2vec: phishing webpage detection method based on multidimensional features driven by deep learning. IEEE Access 8, 221214\u2013221224 (2020). https:\/\/doi.org\/10.1109\/access.2020.3043188","journal-title":"IEEE Access"},{"key":"778_CR13","doi-asserted-by":"publisher","unstructured":"Opara, C., Chen, Y., wei, B.: Look Before You Leap: Detecting Phishing Web Pages by Exploiting Raw URL And HTML Characteristics. arXiv (2020). https:\/\/doi.org\/10.48550\/ARXIV.2011.04412. https:\/\/arxiv.org\/abs\/2011.04412","DOI":"10.48550\/ARXIV.2011.04412"},{"key":"778_CR14","doi-asserted-by":"publisher","first-page":"22170","DOI":"10.1109\/access.2020.2969780","volume":"8","author":"AE Aassal","year":"2020","unstructured":"Aassal, A.E., Baki, S., Das, A., Verma, R.M.: An in-depth benchmarking and evaluation of phishing detection research for security needs. IEEE Access 8, 22170\u201322192 (2020). https:\/\/doi.org\/10.1109\/access.2020.2969780","journal-title":"IEEE Access"},{"key":"778_CR15","doi-asserted-by":"publisher","unstructured":"Opara, C., Wei, B., Chen, Y.: Htmlphish: Enabling phishing web page detection by applying deep learning techniques on html analysis. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2020). https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207707","DOI":"10.1109\/IJCNN48605.2020.9207707"},{"key":"778_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-030-22479-0_5","volume-title":"Data and Applications Security and Privacy XXXIII","author":"H Shirazi","year":"2019","unstructured":"Shirazi, H., Bezawada, B., Ray, I., Anderson, C.: Adversarial sampling attacks against phishing detection. In: Foley, S.N. (ed.) Data and Applications Security and Privacy XXXIII, pp. 83\u2013101. Springer, Cham (2019)"},{"key":"778_CR17","doi-asserted-by":"publisher","first-page":"82355","DOI":"10.1109\/access.2022.3196018","volume":"10","author":"S Ariyadasa","year":"2022","unstructured":"Ariyadasa, S., Fernando, S., Fernando, S.: Combining long-term recurrent convolutional and graph convolutional networks to detect phishing sites using URL and HTML. IEEE Access 10, 82355\u201382375 (2022). https:\/\/doi.org\/10.1109\/access.2022.3196018","journal-title":"IEEE Access"},{"key":"778_CR18","doi-asserted-by":"publisher","unstructured":"Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL Detection using Machine Learning: A Survey. arXiv (2017). https:\/\/doi.org\/10.48550\/ARXIV.1701.07179. https:\/\/arxiv.org\/abs\/1701.07179","DOI":"10.48550\/ARXIV.1701.07179"},{"issue":"2","key":"778_CR19","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2013","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443\u2013458 (2013). https:\/\/doi.org\/10.1007\/s00521-013-1490-z","journal-title":"Neural Comput. Appl."},{"issue":"12","key":"778_CR20","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1093\/comjnl\/bxx035","volume":"60","author":"E-SM El-Alfy","year":"2017","unstructured":"El-Alfy, E.-S.M.: Detection of phishing websites based on probabilistic neural networks and k-medoids clustering. Comput. J. 60(12), 1745\u20131759 (2017). https:\/\/doi.org\/10.1093\/comjnl\/bxx035","journal-title":"Comput. J."},{"key":"778_CR21","doi-asserted-by":"publisher","unstructured":"Buber, E., Demir, O., Sahingoz, O.K.: Feature selections for the machine learning based detection of phishing websites. In: 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/IDAP.2017.8090317","DOI":"10.1109\/IDAP.2017.8090317"},{"key":"778_CR22","doi-asserted-by":"publisher","first-page":"15196","DOI":"10.1109\/access.2019.2892066","volume":"7","author":"P Yang","year":"2019","unstructured":"Yang, P., Zhao, G., Zeng, P.: Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7, 15196\u201315209 (2019). https:\/\/doi.org\/10.1109\/access.2019.2892066","journal-title":"IEEE Access"},{"key":"778_CR23","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117, 345\u2013357 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2018.09.029","journal-title":"Expert Syst. Appl."},{"key":"778_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/2595794","volume":"2019","author":"W Wang","year":"2019","unstructured":"Wang, W., Zhang, F., Luo, X., Zhang, S.: PDRCNN: precise phishing detection with recurrent convolutional neural networks. Secur. Commun. Netw. 2019, 1\u201315 (2019). https:\/\/doi.org\/10.1155\/2019\/2595794","journal-title":"Secur. Commun. Netw."},{"key":"778_CR25","doi-asserted-by":"publisher","first-page":"83425","DOI":"10.1109\/access.2020.2991403","volume":"8","author":"M Sameen","year":"2020","unstructured":"Sameen, M., Han, K., Hwang, S.O.: PhishHaven\u2014an efficient real-time AI phishing URLs detection system. IEEE Access 8, 83425\u201383443 (2020). https:\/\/doi.org\/10.1109\/access.2020.2991403","journal-title":"IEEE Access"},{"key":"778_CR26","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/978-981-13-2203-752","volume-title":"Data Science","author":"W Chen","year":"2018","unstructured":"Chen, W., Zhang, W., Su, Y.: Phishing detection research based on lstm recurrent neural network. In: Zhou, Q., Gan, Y., Jing, W., Song, X., Wang, Y., Lu, Z. (eds.) Data Science, pp. 638\u2013645. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2203-752"},{"key":"778_CR27","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: Deepphish: simulating malicious ai. In: 2018 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u20138 (2018)","DOI":"10.1109\/ECRIME.2017.7945048"},{"issue":"7553","key":"778_CR28","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015). https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"key":"778_CR29","doi-asserted-by":"publisher","unstructured":"Chauhan, N.K., Singh, K.: A review on conventional machine learning vs deep learning. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 347\u2013352 (2018). https:\/\/doi.org\/10.1109\/GUCON.2018.8675097","DOI":"10.1109\/GUCON.2018.8675097"},{"key":"778_CR30","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement learning: an introduction (2018)"},{"key":"778_CR31","doi-asserted-by":"publisher","unstructured":"Chatterjee, M., Namin, A.S.: Deep Reinforcement Learning for Detecting Malicious Websites. arXiv (2019). https:\/\/doi.org\/10.48550\/ARXIV.1905.09207. https:\/\/arxiv.org\/abs\/1905.09207","DOI":"10.48550\/ARXIV.1905.09207"},{"issue":"10","key":"778_CR32","doi-asserted-by":"publisher","first-page":"168","DOI":"10.3390\/fi12100168","volume":"12","author":"R Alabdan","year":"2020","unstructured":"Alabdan, R.: Phishing attacks survey: types, vectors, and technical approaches. Future Internet 12(10), 168 (2020). https:\/\/doi.org\/10.3390\/fi12100168","journal-title":"Future Internet"},{"key":"778_CR33","unstructured":"Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: Deepphish : Simulating malicious ai. (2018)"},{"key":"778_CR34","doi-asserted-by":"publisher","unstructured":"Verma, R.M., Zeng, V., Faridi, H.: Data quality for security challenges. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3319535.3363267","DOI":"10.1145\/3319535.3363267"},{"issue":"6","key":"778_CR35","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3390\/fi13060154","volume":"13","author":"A Butnaru","year":"2021","unstructured":"Butnaru, A., Mylonas, A., Pitropakis, N.: Towards lightweight URL-based phishing detection. Future Internet 13(6), 154 (2021). https:\/\/doi.org\/10.3390\/fi13060154","journal-title":"Future Internet"},{"key":"778_CR36","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0130597","author":"S Ariyadasa","year":"2022","unstructured":"Ariyadasa, S., Fernando, S., Fernando, S.: PhishRepo: a seamless collection of phishing data to fill a research gap in the phishing domain. Int. J. Adv. Comput. Sci. Appl. (2022). https:\/\/doi.org\/10.14569\/ijacsa.2022.0130597","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"778_CR37","doi-asserted-by":"publisher","unstructured":"Wu, C.-Y., Kuo, C.-C., Yang, C.-S.: A phishing detection system based on machine learning. In: 2019 International Conference on Intelligent Computing and Its Emerging Applications (ICEA), pp. 28\u201332 (2019). https:\/\/doi.org\/10.1109\/ICEA.2019.8858325","DOI":"10.1109\/ICEA.2019.8858325"},{"issue":"2","key":"778_CR38","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.jksuci.2019.12.005","volume":"34","author":"AA Orunsolu","year":"2022","unstructured":"Orunsolu, A.A., Sodiya, A.S., Akinwale, A.T.: A predictive model for phishing detection. J. King Saudi Univ. Comput. Inf. Sci. 34(2), 232\u2013247 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.005","journal-title":"J. King Saudi Univ. Comput. Inf. Sci."},{"issue":"7","key":"778_CR39","doi-asserted-by":"publisher","first-page":"56","DOI":"10.21833\/ijaas.2020.07.007","volume":"7","author":"S Ariyadasa","year":"2020","unstructured":"Ariyadasa, S., Fernando, S., Fernando, S.: Detecting phishing attacks using a combined model of LSTM and CNN. Int. J. Adv. Appl. Sci. 7(7), 56\u201367 (2020). https:\/\/doi.org\/10.21833\/ijaas.2020.07.007","journal-title":"Int. J. Adv. Appl. Sci."},{"issue":"3\u20134","key":"778_CR40","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1561\/2200000071","volume":"11","author":"V Franc\u00b8ois-Lavet","year":"2018","unstructured":"Franc\u00b8ois-Lavet, V., Henderson, P., Islam, R., Bellemare, M.G., Pineau, J.: An introduction to deep reinforcement learning. Found. Trends Mach. Learn. 11(3\u20134), 219\u2013354 (2018). https:\/\/doi.org\/10.1561\/2200000071","journal-title":"Found. Trends Mach. Learn."},{"key":"778_CR41","doi-asserted-by":"publisher","unstructured":"Levine, S., Kumar, A., Tucker, G., Fu, J.: Offline Reinforcement Learning: Tutorial, Review, and Perspectives on Open Problems. arXiv (2020). https:\/\/doi.org\/10.48550\/ARXIV.2005.01643. https:\/\/arxiv.org\/abs\/2005.01643","DOI":"10.48550\/ARXIV.2005.01643"},{"issue":"7540","key":"778_CR42","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., Petersen, S., Beattie, C., Sadik, A., Antonoglou, I., King, H., Kumaran, D., Wierstra, D., Legg, S., Hassabis, D.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015). https:\/\/doi.org\/10.1038\/nature14236","journal-title":"Nature"},{"key":"778_CR43","doi-asserted-by":"publisher","unstructured":"Tuan Nguyen, L.A., To, B.L., Nguyen, H.K., Nguyen, M.H.: An efficient approach for phishing detection using single-layer neural network. In: 2014 International Conference on Advanced Technologies for Communications (ATC 2014), pp. 435\u2013440 (2014). https:\/\/doi.org\/10.1109\/ATC.2014.7043427","DOI":"10.1109\/ATC.2014.7043427"},{"key":"778_CR44","doi-asserted-by":"publisher","DOI":"10.17632\/N96NCSR5G4.1","author":"S Ariyadasa","year":"2021","unstructured":"Ariyadasa, S., Fernando, S., Fernando, S.: Phishing websites dataset. Mendeley (2021). https:\/\/doi.org\/10.17632\/N96NCSR5G4.1","journal-title":"Mendeley"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00778-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00778-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00778-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T14:52:09Z","timestamp":1730559129000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00778-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["778"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00778-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,21]]},"assertion":[{"value":"22 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}