{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:25:39Z","timestamp":1772119539512,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01157-2","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T16:32:54Z","timestamp":1767717174000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced phishing detection using binary encoding XGBoost and LSTM feature extraction and capsule network classification"],"prefix":"10.1007","volume":"25","author":[{"given":"Azath","family":"Mubarakali","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"issue":"1","key":"1157_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.55056\/jec.648","volume":"3","author":"AI Jony","year":"2024","unstructured":"Jony, A.I., Arnob, A.K.B.: A long short-term memory-based approach for detecting cyber-attacks in IoT using CIC-IoT2023 dataset. J. Edge Comput. 3(1), 28\u201342 (2024). https:\/\/doi.org\/10.55056\/jec.648","journal-title":"J. Edge Comput."},{"key":"1157_CR2","unstructured":"Ullah, A., Shah, R.A., Nawaz, S.A., Ahmad, N., Malik, M.H.: Enhancing phishing Detection, leveraging deep learning techniques. J. Comput. Biomedical Inf. (2024). https:\/\/jcbi.org\/index.php\/Main\/article\/view\/340"},{"key":"1157_CR3","doi-asserted-by":"crossref","unstructured":"Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A.: Internet of Things: Security and Solutions Survey. (2022). https:\/\/www.mdpi.com\/1424-8220\/22\/19\/7433","DOI":"10.3390\/s22197433"},{"key":"1157_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100533","author":"M Nanda","year":"2024","unstructured":"Nanda, M., Saraswat, M., Sharma, P.K.: E-Prime - Adv. Electr. Eng. Electron. Energy. 8, 100533 (2024). https:\/\/doi.org\/10.1016\/j.prime.2024.100533 Enhancing cybersecurity: A review and comparative analysis of convolutional neural network approaches for detecting URL-based phishing attacks"},{"key":"1157_CR5","doi-asserted-by":"publisher","unstructured":"Lee, J., Lee, Y., Lee, D., Kwon, H., Shin, D.: Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. IEEE Access, 9, 80866\u201380872. IEEE Access. (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3084897","DOI":"10.1109\/ACCESS.2021.3084897"},{"key":"1157_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-025-02703-w","author":"P Wanda","year":"2025","unstructured":"Wanda, P., Diqi, M., Hamzah, et al.: DeepPhishing: Stepping up phishing detection using generative round network. Int. j. inf. Tecnol. (2025). https:\/\/doi.org\/10.1007\/s41870-025-02703-w","journal-title":"Int. j. inf. Tecnol"},{"issue":"4","key":"1157_CR7","doi-asserted-by":"publisher","first-page":"2583","DOI":"10.1007\/s10207-024-00851-x","volume":"23","author":"MA Elberri","year":"2024","unstructured":"Elberri, M.A., Toke\u015fer, \u00dc., Rahebi, J., Lopez-Guede, J.M.: A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African Vulture optimization algorithm (AVOA). Int. J. Inf. Secur. 23(4), 2583\u20132606 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00851-x","journal-title":"Int. J. Inf. Secur."},{"key":"1157_CR8","doi-asserted-by":"crossref","unstructured":"Adhikari, D., Ullah, I., Syed, I., Choi, C.: Phishing Detection in the Internet of Things for Cybersecurity | 6 | C. (2023). https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.1201\/9781003369042-6\/phishing-detection-internet-things-cybersecurity-deepak-adhikari-inam-ullah-ikram-syed-chang-choi","DOI":"10.1201\/9781003369042-6"},{"key":"1157_CR9","doi-asserted-by":"publisher","unstructured":"Abdulrahman, L.M., Ahmed, S.H., Rashid, Z.N., Jghef, Y.S., Ghazi, T.M., Jader, U.H.: Web phishing detection using web Crawling, cloud infrastructure and deep learning framework. J. Appl. Sci. Technol. Trends. 4(01) (2023). Article 01 https:\/\/doi.org\/10.38094\/jastt401144","DOI":"10.38094\/jastt401144"},{"key":"1157_CR10","doi-asserted-by":"publisher","first-page":"115742","DOI":"10.1016\/j.eswa.2021.115742","volume":"186","author":"S Rao","year":"2021","unstructured":"Rao, S., Verma, A.K., Bhatia, T.: A review on social spam detection: Challenges, open issues, and future directions. Expert Syst. Appl. 186, 115742 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.115742","journal-title":"Expert Syst. Appl."},{"key":"1157_CR11","doi-asserted-by":"publisher","unstructured":"Tang, L., Mahmoud, Q.H.: A survey of machine Learning-Based solutions for phishing website detection. Mach. Learn. Knowl. Extr. 3(3) (2021). https:\/\/doi.org\/10.3390\/make3030034","DOI":"10.3390\/make3030034"},{"key":"1157_CR12","doi-asserted-by":"publisher","unstructured":"Joshi, K., Bhatt, C., Shah, K., Parmar, D., Corchado, J.M., Bruno, A., Mazzeo, P.L.: Machine-Learning techniques for predicting phishing attacks in blockchain networks: A comparative study. Algorithms. 16(8) (2023). Article 8 https:\/\/doi.org\/10.3390\/a16080366","DOI":"10.3390\/a16080366"},{"key":"1157_CR13","doi-asserted-by":"publisher","unstructured":"Sahu, D.R., Tiwari, H., Tomar, D.S., Pateriya, R.K.: Quantum-Resistant Cryptography to Prevent from Phishing Attack Exploiting Blockchain Wallet. In A. Kumar, N. J. Ahuja, K. Kaushik, D. S. Tomar, & S. B. Khan (Eds.), Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (pp. 171\u2013191). Springer Nature. (2024). https:\/\/doi.org\/10.1007\/978-981-97-0088-2_9","DOI":"10.1007\/978-981-97-0088-2_9"},{"key":"1157_CR14","doi-asserted-by":"publisher","unstructured":"Chakraborty, A., Biswas, A., Khan, A.K.: Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation | SpringerLink. https:\/\/link.springer.com\/chapter\/ (2023). https:\/\/doi.org\/10.1007\/978-3-031-12419-8_1","DOI":"10.1007\/978-3-031-12419-8_1"},{"key":"1157_CR15","doi-asserted-by":"publisher","first-page":"e01165","DOI":"10.1016\/j.sciaf.2022.e01165","volume":"16","author":"TO Ojewumi","year":"2022","unstructured":"Ojewumi, T.O., Ogunleye, G.O., Oguntunde, B.O., Folorunsho, O., Fashoto, S.G., Ogbu, N.: Performance evaluation of machine learning tools for detection of phishing attacks on web pages. Sci. Afr. 16, e01165 (2022). https:\/\/doi.org\/10.1016\/j.sciaf.2022.e01165","journal-title":"Sci. Afr."},{"key":"1157_CR16","doi-asserted-by":"publisher","unstructured":"Yeng, P.K., Fauzi, M.A., Yang, B., Nimbe, P.: Investigation into phishing risk behaviour among healthcare staff. Information. 13(8) (2022). https:\/\/doi.org\/10.3390\/info13080392","DOI":"10.3390\/info13080392"},{"key":"1157_CR17","doi-asserted-by":"crossref","unstructured":"Azeez, N.A., Salaudeen, B.B., Misra, S., Dama\u0161evi\u010dius, R., Maskeli\u016bnas, R.: Identifying phishing attacks in communication networks using URL consistency features. (2020)","DOI":"10.1504\/IJESDF.2020.106318"},{"issue":"8","key":"1157_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469886","volume":"54","author":"G Desolda","year":"2021","unstructured":"Desolda, G., Ferro, L.S., Marrella, A., Catarci, T., Costabile, M.F.: Human factors in phishing attacks: A systematic literature review. ACM Comput. Surv. 54(8), 173:1\u2013173 (2021). https:\/\/doi.org\/10.1145\/3469886","journal-title":"ACM Comput. Surv."},{"key":"1157_CR19","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1007\/s42979-025-04154-3","volume":"6","author":"R Jadon","year":"2025","unstructured":"Jadon, R., Gollapalli, V.S.T., Budda, R., et al.: Phishing detection and Zero-Trust verification with spiking neural networks auto encoder and Selu activation. SN COMPUT. SCI. 6, 676 (2025). https:\/\/doi.org\/10.1007\/s42979-025-04154-3","journal-title":"SN COMPUT. SCI."},{"key":"1157_CR20","doi-asserted-by":"publisher","first-page":"107546","DOI":"10.1016\/j.compeleceng.2021.107546","volume":"96","author":"A Bhardwaj","year":"2021","unstructured":"Bhardwaj, A., Al-Turjman, F., Sapra, V., Kumar, M., Stephan, T.: Privacy-aware detection framework to mitigate new-age phishing attacks. Comput. Electr. Eng. 96, 107546 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107546","journal-title":"Comput. Electr. Eng."},{"key":"1157_CR21","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2024.61874","author":"R Prasanna","year":"2024","unstructured":"Prasanna, R.: Enhancing phishing detection: A novel hybrid deep learning framework for cybercrime forensics. Int. J. Res. Appl. Sci. Eng. Technol. (2024). https:\/\/doi.org\/10.22214\/ijraset.2024.61874","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"1157_CR22","doi-asserted-by":"publisher","unstructured":"Ajay, G., Garg, K., Prasad, R.: February 9). Phishing email detection using machine learning: A critical review. SciSpace - Paper. (2024). https:\/\/doi.org\/10.1109\/ic2pct60090.2024.10486341","DOI":"10.1109\/ic2pct60090.2024.10486341"},{"key":"1157_CR23","doi-asserted-by":"publisher","unstructured":"Asiri, S., Xiao, Y., Li, T., Alzahrani, S.: PhishingRTDS: A Real-time Detection System for Phishing Attacks Using a Deep Learning Model. SciSpace - Paper. (2024)., April 1 https:\/\/doi.org\/10.1016\/j.cose.2024.103843","DOI":"10.1016\/j.cose.2024.103843"},{"key":"1157_CR24","doi-asserted-by":"publisher","first-page":"132306","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long Short-Term memory (LSTM) network. Phys. D Nonlinear Phenom. 404, 132306 (2020). https:\/\/doi.org\/10.1016\/j.physd.2019.132306","journal-title":"Phys. D Nonlinear Phenom."},{"key":"1157_CR25","doi-asserted-by":"publisher","unstructured":"Zim, A., Iqbal, A., Malik, A., Dong, Z., Wu, H.: August 27). TCNFormer: Temporal convolutional network former for Short-Term wind speed forecasting. SciSpace - Paper; Cornell University. (2024). https:\/\/doi.org\/10.48550\/arxiv.2408.15737","DOI":"10.48550\/arxiv.2408.15737"},{"key":"1157_CR26","doi-asserted-by":"publisher","first-page":"8829639","DOI":"10.1155\/2021\/8829639","volume":"20211","author":"X Luo","year":"2021","unstructured":"Luo, X., Gan, W., Wang, L., Chen, Y., Ma, E.: A deep learning prediction model for structural deformation based on Temporal convolutional networks. Comput. Intell. Neurosci. 20211, 8829639 (2021). https:\/\/doi.org\/10.1155\/2021\/8829639","journal-title":"Comput. Intell. Neurosci."},{"key":"1157_CR27","doi-asserted-by":"publisher","first-page":"105604","DOI":"10.1016\/j.cmpb.2020.105604","volume":"196","author":"SL Oh","year":"2020","unstructured":"Oh, S.L., Jahmunah, V., Ooi, C.P., Tan, R.-S., Ciaccio, E.J., Yamakawa, T., Tanabe, M., Kobayashi, M., Acharya, U.R.: Classification of heart sound signals using a novel deep WaveNet model. Comput. Methods Programs Biomed. 196, 105604 (2020). https:\/\/doi.org\/10.1016\/j.cmpb.2020.105604","journal-title":"Comput. Methods Programs Biomed."},{"key":"1157_CR28","doi-asserted-by":"publisher","first-page":"115900","DOI":"10.1016\/j.oceaneng.2023.115900","volume":"287","author":"T Lv","year":"2023","unstructured":"Lv, T., Tao, A., Zhang, Z., Qin, S., Wang, G.: Significant wave height prediction based on the local-EMD-WaveNet model. Ocean Eng. 287, 115900 (2023). https:\/\/doi.org\/10.1016\/j.oceaneng.2023.115900","journal-title":"Ocean Eng."},{"key":"1157_CR29","doi-asserted-by":"publisher","unstructured":"Mahaseni, B., Faizal, E.R.M., Raj, R.G.: Spotting Football Events Using Two-Stream Convolutional Neural Network and Dilated Recurrent Neural Network. IEEE Access, 9, 61929\u201361942. IEEE Access. (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3074831","DOI":"10.1109\/ACCESS.2021.3074831"},{"key":"1157_CR30","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.neunet.2023.03.004","volume":"162","author":"MS Islam","year":"2023","unstructured":"Islam, M.S., Hasan, K.F., Sultana, S., Uddin, S., Lio\u2019, P., Quinn, J.M.W., Moni, M.A.: HARDC: A novel ECG-based heartbeat classification method to detect arrhythmia using hierarchical attention based dual structured RNN with dilated CNN. Neural Netw. 162, 271\u2013287 (2023). https:\/\/doi.org\/10.1016\/j.neunet.2023.03.004","journal-title":"Neural Netw."},{"key":"1157_CR31","doi-asserted-by":"publisher","unstructured":"Li, Y., Liu, M., Drossos, K., Virtanen, T.: Sound Event Detection Via Dilated Convolutional Recurrent Neural Networks. ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 286\u2013290. (2020). https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9054433","DOI":"10.1109\/ICASSP40776.2020.9054433"},{"key":"1157_CR32","doi-asserted-by":"crossref","unstructured":"Saad Al-Ahmadi: PDMLP: Phishing Detection Using Multilayer Perceptron by Saad Al-Ahmadi: SSRN. (2020). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3624621","DOI":"10.2139\/ssrn.3922446"},{"issue":"1","key":"1157_CR33","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10207-023-00756-1","volume":"23","author":"M Adnan","year":"2024","unstructured":"Adnan, M., Imam, M.O., Javed, M.F., Murtza, I.: Improving spam email classification accuracy using ensemble techniques: A stacking approach. Int. J. Inf. Secur. 23(1), 505\u2013517 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00756-1","journal-title":"Int. J. Inf. Secur."},{"key":"1157_CR34","doi-asserted-by":"publisher","unstructured":"Nagy, N., Aljabri, M., Shaahid, A., Ahmed, A.A., Alnasser, F., Almakramy, L., Alhadab, M., Alfaddagh, S.: Phishing urls detection using sequential and parallel ML techniques. Comp. Anal. Sens. 23(7) (2023). Article 7 https:\/\/doi.org\/10.3390\/s23073467","DOI":"10.3390\/s23073467"},{"key":"1157_CR35","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s44163-024-00154-z","volume":"4","author":"FA Demmese","year":"2024","unstructured":"Demmese, F.A., Shajarian, S., Khorsandroo, S.: Transfer learning with ResNet50 for malicious domains classification using image visualization. Discov Artif. Intell. 4, 52 (2024). https:\/\/doi.org\/10.1007\/s44163-024-00154-z","journal-title":"Discov Artif. Intell."},{"issue":"3","key":"1157_CR36","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/s12046-024-02582-0","volume":"49","author":"KM Sudar","year":"2024","unstructured":"Sudar, K.M., Rohan, M., Vignesh, K.: Detection of adversarial phishing attack using machine learning techniques. S\u0101dhan\u0101. 49(3), 232 (2024). https:\/\/doi.org\/10.1007\/s12046-024-02582-0","journal-title":"S\u0101dhan\u0101"},{"key":"1157_CR37","doi-asserted-by":"publisher","first-page":"5245","DOI":"10.3390\/app11115245","volume":"11","author":"SM Raza","year":"2021","unstructured":"Raza, S.M., Jeong, H., Kim, M., Choo, H.: HP-SFC: Hybrid protection mechanism using source routing for service function Chaining. Appl. Sci. 11, 5245 (2021). https:\/\/doi.org\/10.3390\/app11115245","journal-title":"Appl. Sci."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01157-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01157-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01157-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:27Z","timestamp":1769875647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01157-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1157"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01157-2","relation":{"references":[{"id-type":"doi","id":"10.1016\/j.prime.2024.100533","asserted-by":"subject"}],"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7485526\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"29 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"25"}}