{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T12:07:20Z","timestamp":1774958840282,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100021546","name":"Suez University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100021546","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Phishing attacks, which trick users and obtain private data, are still a constant threat to cybersecurity. Using a large dataset of 10,000 samples, each with handcrafted features that capture URL structure and content-based cues, this study suggests an optimized deep learning framework for phishing website detection. The Binary Genetic Algorithm (BGA) is used for feature selection to improve model performance, and Bayesian Optimization (BO) is used for hyperparameter tuning. After normalization, the dataset is separated into subsets for training (70%), validation (15%), and testing (15%). CNN, VGG19, GRU, RNN, ResNet-50, and a CNN-VGG19 hybrid model are among the models that are assessed. According to experimental results, the CNN-VGG19 model performs best, achieving 0.9900 F1-score, 0.9901 precision, 0.99 recall, and 99.0% accuracy. This demonstrates how well convolutional neural networks and transfer learning work together to detect phishing attempts. The suggested model is a good fit for incorporation into real-time anti-phishing systems due to its robustness and strong classification capabilities. The combination of optimization, transfer learning, and deep feature extraction improves its performance.<\/jats:p>","DOI":"10.1007\/s10586-025-05896-8","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T11:28:40Z","timestamp":1774956520000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An enhanced deep learning model for phishing detection based on bayesian optimization and hybrid CNN VGG19 model"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3048-1920","authenticated-orcid":false,"given":"Ahmed M.","family":"Elshewey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0527-533X","authenticated-orcid":false,"given":"Ahmed M.","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Hazem M.","family":"El-Bakry","sequence":"additional","affiliation":[]},{"given":"Rasha Y.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"key":"5896_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103123","volume":"128","author":"MortezaSafaei Pour","year":"2023","unstructured":"Pour, Morteza Safaei, et al.: A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Computers & Security 128, 103123 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103123","journal-title":"Computers & Security"},{"issue":"21","key":"5896_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12214545","volume":"12","author":"Kutub Thakur","year":"2023","unstructured":"Thakur, Kutub, et al.: A Systematic Review on Deep-Learning-Based Phishing Email Detection. Electronics 12(21), 4545 (2023). https:\/\/doi.org\/10.3390\/electronics12214545","journal-title":"Electronics"},{"issue":"6","key":"5896_CR3","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s10115-022-01672-x","volume":"64","author":"Cagatay Catal","year":"2022","unstructured":"Catal, Cagatay, et al.: Applications of Deep Learning for Phishing Detection: A Systematic Literature Review. Knowledge and Information Systems 64(6), 1457\u2013500 (2022). https:\/\/doi.org\/10.1007\/s10115-022-01672-x","journal-title":"Knowledge and Information Systems"},{"issue":"1","key":"5896_CR4","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"Abdul Basit","year":"2020","unstructured":"Basit, Abdul, et al.: A Comprehensive Survey of AI-enabled Phishing Attacks Detection Techniques. Telecommunication Systems 76(1), 139\u201354 (2020). https:\/\/doi.org\/10.1007\/s11235-020-00733-2","journal-title":"Telecommunication Systems"},{"issue":"3","key":"5896_CR5","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1049\/ise2.12106","volume":"17","author":"ManojKumar Prabakaran","year":"2023","unstructured":"Prabakaran, Manoj Kumar, et al.: An Enhanced Deep Learning-based Phishing Detection Mechanism to Effectively Identify Malicious URLs Using Variational Autoencoders. IET Information Security 17(3), 423\u201340 (2023). https:\/\/doi.org\/10.1049\/ise2.12106","journal-title":"IET Information Security"},{"key":"5896_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/23742917.2024.2378552","volume":"9","author":"Er. Kritika","year":"2024","unstructured":"Kritika, Er..: A Comprehensive Literature Review on Phishing URL Detection Using Deep Learning Techniques. Journal of Cyber Security Technology 9, 1 (2024). https:\/\/doi.org\/10.1080\/23742917.2024.2378552","journal-title":"Journal of Cyber Security Technology"},{"issue":"7","key":"5896_CR7","doi-asserted-by":"publisher","DOI":"10.3390\/s24072077","volume":"24","author":"Najwa Altwaijry","year":"2024","unstructured":"Altwaijry, Najwa, et al.: Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. Sensors 24(7), 2077 (2024). https:\/\/doi.org\/10.3390\/s24072077","journal-title":"Sensors"},{"issue":"3","key":"5896_CR8","doi-asserted-by":"publisher","first-page":"672","DOI":"10.3390\/make3030034","volume":"3","author":"Lizhen Tang","year":"2021","unstructured":"Tang, Lizhen, Mahmoud, Qusay H..: A Survey of Machine Learning-Based Solutions for Phishing Website Detection. Machine Learning and Knowledge Extraction 3(3), 672\u201394 (2021). https:\/\/doi.org\/10.3390\/make3030034","journal-title":"Machine Learning and Knowledge Extraction"},{"key":"5896_CR9","doi-asserted-by":"publisher","first-page":"36805","DOI":"10.1109\/access.2023.3252366","volume":"11","author":"Abdul Karim","year":"2023","unstructured":"Karim, Abdul, et al.: Phishing Detection System Through Hybrid Machine Learning Based on URL. IEEE Access 11, 36805\u201322 (2023). https:\/\/doi.org\/10.1109\/access.2023.3252366","journal-title":"IEEE Access"},{"issue":"1","key":"5896_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010042","volume":"12","author":"HanyF. Atlam","year":"2022","unstructured":"Atlam, Hany F.., Oluwatimilehin, Olayonu: Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review. Electronics 12(1), 42 (2022). https:\/\/doi.org\/10.3390\/electronics12010042","journal-title":"Electronics"},{"issue":"19","key":"5896_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/app12199637","volume":"12","author":"Abdulalem Ali","year":"2022","unstructured":"Ali, Abdulalem, et al.: Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review. Applied Sciences 12(19), 9637 (2022). https:\/\/doi.org\/10.3390\/app12199637","journal-title":"Applied Sciences"},{"issue":"1","key":"5896_CR12","doi-asserted-by":"publisher","first-page":"304","DOI":"10.3390\/make5010019","volume":"5","author":"Emilija Strelcenia","year":"2023","unstructured":"Strelcenia, Emilija, Prakoonwit, Simant: A Survey on GAN Techniques for Data Augmentation to Address the Imbalanced Data Issues in Credit Card Fraud Detection. Machine Learning and Knowledge Extraction 5(1), 304\u201329 (2023). https:\/\/doi.org\/10.3390\/make5010019","journal-title":"Machine Learning and Knowledge Extraction"},{"key":"5896_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103387","volume":"132","author":"Bilal Naqvi","year":"2023","unstructured":"Naqvi, Bilal, et al.: Mitigation Strategies Against the Phishing Attacks: A Systematic Literature Review. Computers & Security 132, 103387 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103387","journal-title":"Computers & Security"},{"key":"5896_CR14","doi-asserted-by":"publisher","first-page":"18499","DOI":"10.1109\/access.2023.3247135","volume":"11","author":"Rasha Zieni","year":"2023","unstructured":"Zieni, Rasha, et al.: Phishing or Not Phishing? A Survey on the Detection of Phishing Websites. IEEE Access 11, 18499\u2013519 (2023). https:\/\/doi.org\/10.1109\/access.2023.3247135","journal-title":"IEEE Access"},{"key":"5896_CR15","doi-asserted-by":"publisher","first-page":"685","DOI":"10.58496\/MJCS\/2025\/041","volume":"5","author":"ESM El-Kenawy","year":"2025","unstructured":"El-Kenawy, E.S.M., Eid, M.M., Hussein, H.L., Osman, A.M., Elshewey, A.M.: Optimized Deep Learning Model Using Binary Particle Swarm Optimization for Phishing Attack Detection: A Comparative Study. Mesopotamian Journal of CyberSecurity 5, 685\u2013703 (2025). https:\/\/doi.org\/10.58496\/MJCS\/2025\/041","journal-title":"Mesopotamian Journal of CyberSecurity"},{"key":"5896_CR16","doi-asserted-by":"publisher","first-page":"4895","DOI":"10.32604\/CMC.2024.050815","volume":"80","author":"BB Gupta","year":"2024","unstructured":"Gupta, B.B., Gaurav, A., Attar, R.W., Arya, V., Alhomoud, A., Chui, K.T.: Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm. Computers, Materials & Continua 80, 4895\u20134916 (2024). https:\/\/doi.org\/10.32604\/CMC.2024.050815","journal-title":"Computers, Materials & Continua"},{"key":"5896_CR17","doi-asserted-by":"publisher","unstructured":"Butnaru, A., Mylonas, A., Pitropakis, N.: Towards Lightweight URL-Based Phishing Detection. Future Internet 2021, Vol. 13, Page 154. 13, 154 (2021). https:\/\/doi.org\/10.3390\/FI13060154","DOI":"10.3390\/FI13060154"},{"issue":"1","key":"5896_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-025-02009-8","volume":"15","author":"RS Rao","year":"2025","unstructured":"Rao, R.S., Kondaiah, C., Pais, A.R., Lee, B.: A hybrid super learner ensemble for phishing detection on mobile devices. Scientific Reports 15(1), 1\u201317 (2025). https:\/\/doi.org\/10.1038\/s41598-025-02009-8","journal-title":"Scientific Reports"},{"key":"5896_CR19","doi-asserted-by":"publisher","unstructured":"Alshahrani, S., Almalki, J., Shehri, A., Alshahrani, W., Ahmed Khan, S.M., Author, N.: C.: URL Phishing Detection Using Particle Swarm Optimization and Data Mining. https:\/\/doi.org\/10.32604\/cmc.2022.030982","DOI":"10.32604\/cmc.2022.030982"},{"issue":"9","key":"5896_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/s23094403","volume":"23","author":"EmanAbdullah Aldakheel","year":"2023","unstructured":"Aldakheel, Eman Abdullah, et al.: A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security With Uniform Resource Locators. Sensors 23(9), 4403 (2023). https:\/\/doi.org\/10.3390\/s23094403","journal-title":"Sensors"},{"issue":"2","key":"5896_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/sym16020248","volume":"16","author":"Saba Aslam","year":"2024","unstructured":"Aslam, Saba, et al.: AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection. Symmetry 16(2), 248 (2024). https:\/\/doi.org\/10.3390\/sym16020248","journal-title":"Symmetry"},{"key":"5896_CR22","doi-asserted-by":"publisher","first-page":"42459","DOI":"10.1109\/access.2022.3168235","volume":"10","author":"Saad Al-Ahmadi","year":"2022","unstructured":"Al-Ahmadi, Saad, et al.: PDGAN: Phishing Detection With Generative Adversarial Networks. IEEE Access 10, 42459\u201368 (2022). https:\/\/doi.org\/10.1109\/access.2022.3168235","journal-title":"IEEE Access"},{"key":"5896_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103736","volume":"139","author":"RJ Van Geest","year":"2024","unstructured":"Van Geest, R.J., et al.: The Applicability of a Hybrid Framework for Automated Phishing Detection. Computers & Security 139, 103736 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103736","journal-title":"Computers & Security"},{"key":"5896_CR24","doi-asserted-by":"publisher","first-page":"8052","DOI":"10.1109\/access.2024.3352629","volume":"12","author":"OzgurKoray Sahingoz","year":"2024","unstructured":"Sahingoz, Ozgur Koray, et al.: DEPHIDES: Deep Learning Based Phishing Detection System. IEEE Access 12, 8052\u201370 (2024). https:\/\/doi.org\/10.1109\/access.2024.3352629","journal-title":"IEEE Access"},{"issue":"5","key":"5896_CR25","doi-asserted-by":"publisher","first-page":"3263","DOI":"10.1007\/s10586-023-04042-6","volume":"26","author":"Munish Kumar","year":"2023","unstructured":"Kumar, Munish, et al.: Machine Learning Models for Phishing Detection From TLS Traffic. Cluster Computing 26(5), 3263\u201377 (2023). https:\/\/doi.org\/10.1007\/s10586-023-04042-6","journal-title":"Cluster Computing"},{"key":"5896_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-021-00829-w","author":"AV Ramana","year":"2021","unstructured":"Ramana, A.V., et al.: Stop-Phish: An Intelligent Phishing Detection Method Using Feature Selection Ensemble. Social Network Analysis and Mining (2021). https:\/\/doi.org\/10.1007\/s13278-021-00829-w","journal-title":"Social Network Analysis and Mining"},{"key":"5896_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2023.103114","volume":"56","author":"ManalAbdullah Alohali","year":"2023","unstructured":"Alohali, Manal Abdullah, et al.: Metaheuristics With Deep Learning Driven Phishing Detection for Sustainable and Secure Environment. Sustainable Energy Technologies and Assessments 56, 103114 (2023). https:\/\/doi.org\/10.1016\/j.seta.2023.103114","journal-title":"Sustainable Energy Technologies and Assessments"},{"issue":"20","key":"5896_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/app11209733","volume":"11","author":"Bingyang Guo","year":"2021","unstructured":"Guo, Bingyang, et al.: HinPhish: An Effective Phishing Detection Approach Based on Heterogeneous Information Networks. Applied Sciences 11(20), 9733 (2021). https:\/\/doi.org\/10.3390\/app11209733","journal-title":"Applied Sciences"},{"issue":"8","key":"5896_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/fi14080241","volume":"14","author":"Padmalochan Panda","year":"2022","unstructured":"Panda, Padmalochan, et al.: A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems. Future Internet 14(8), 241 (2022). https:\/\/doi.org\/10.3390\/fi14080241","journal-title":"Future Internet"},{"key":"5896_CR30","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2640","volume":"11","author":"Vishnukumar Ravula","year":"2025","unstructured":"Ravula, Vishnukumar, Ramaiah, Mangayarkarasi: Enhancing Phishing Detection With Dynamic Optimization and Character-level Deep Learning in Cloud Environments. PeerJ Computer Science 11, e2640 (2025). https:\/\/doi.org\/10.7717\/peerj-cs.2640","journal-title":"PeerJ Computer Science"},{"key":"5896_CR31","doi-asserted-by":"publisher","first-page":"50578","DOI":"10.1109\/access.2024.3384840","volume":"12","author":"Sanjukta Mohanty","year":"2024","unstructured":"Mohanty, Sanjukta, et al.: An Efficient Hybrid Feature Selection Technique Toward Prediction of Suspicious URLs in IoT Environment. IEEE Access 12, 50578\u201394 (2024). https:\/\/doi.org\/10.1109\/access.2024.3384840","journal-title":"IEEE Access"},{"key":"5896_CR32","doi-asserted-by":"publisher","unstructured":"Tan, C.L., Data, M.: V1, (2018). https:\/\/doi.org\/10.17632\/h3cgnj8hft.1","DOI":"10.17632\/h3cgnj8hft.1"},{"key":"5896_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103545","volume":"136","author":"A Prasad","year":"2024","unstructured":"Prasad, A., Chandra, S.: PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Computers & Security 136, 103545 (2024). https:\/\/doi.org\/10.1016\/J.COSE.2023.103545","journal-title":"Computers & Security"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05896-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05896-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05896-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T11:28:41Z","timestamp":1774956521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05896-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,31]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,8]]}},"alternative-id":["5896"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05896-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,31]]},"assertion":[{"value":"29 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"231"}}