{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:45:00Z","timestamp":1768265100881,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11235-025-01337-4","type":"journal-article","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T07:14:37Z","timestamp":1755501277000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Defense-optimized BERT architecture against digital arrest attacks in intelligent systems"],"prefix":"10.1007","volume":"88","author":[{"given":"Akshat","family":"Gaurav","sequence":"first","affiliation":[]},{"given":"Vincent Shin-Hung","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Razaz Waheeb","family":"Attar","sequence":"additional","affiliation":[]},{"given":"Amal Hassan","family":"Alhazmi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Alhomoud","sequence":"additional","affiliation":[]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,18]]},"reference":[{"key":"1337_CR1","unstructured":"Vanna, k. (2025). What is Digital Arrest ? Understanding The New Cyber Threats. Insights2Techinfo. [Online; accessed 01-1-2025]"},{"key":"1337_CR2","unstructured":"Gupta, B. B. (2025). Digital Arrest Scams in India: Unmasking Cyber Fraud and Protecting Victims. Insights2Techinfo. [Online; accessed 01-1-2025]"},{"key":"1337_CR3","doi-asserted-by":"publisher","unstructured":"Singh, D. A., & Sharma, D. (2025). A new frontier in cybercrime and its repercussions: Digital arrest. International Journal for Multidisciplinary Research. https:\/\/doi.org\/10.36948\/ijfmr.2025.v07i01.33240","DOI":"10.36948\/ijfmr.2025.v07i01.33240"},{"key":"1337_CR4","doi-asserted-by":"publisher","unstructured":"Manwani, R. (2025). The rise of digital arrests: Cybercrime in the modern era. Jier https:\/\/doi.org\/10.52783\/jier.v5i1.2112","DOI":"10.52783\/jier.v5i1.2112"},{"issue":"1","key":"1337_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.371761","volume":"17","author":"SMH Zaidi","year":"2025","unstructured":"Zaidi, S. M. H., Iqbal, R., Alharbi, A., Zuberi, H. H., Ahmed, A., & Sheikh, M. U. (2025). Intelligent process automation using artificial intelligence to create human assistant. International Journal of Software Science and Computational Intelligence (IJSSCI), 17(1), 1\u201319.","journal-title":"International Journal of Software Science and Computational Intelligence (IJSSCI)"},{"key":"1337_CR6","doi-asserted-by":"publisher","unstructured":"Kumar, M. (2024). A comprehensive framework for preventing digital arrest scams: Integrating predictive crime script models, cognitive resilience, advanced forensics, and public awareness. International Journal of Advanced Research in Science Communication and Technology https:\/\/doi.org\/10.48175\/ijarsct-18796","DOI":"10.48175\/ijarsct-18796"},{"key":"1337_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., Gaurav, A., Attar, R. W., Arya, V., Bansal, S., Alhomoud, A., & Chui, K. T. (2024). A hybrid cnn-brown-bear optimization framework for enhanced detection of url phishing attacks. Computers, Materials & Continua 81(3)","DOI":"10.32604\/cmc.2024.057138"},{"issue":"1","key":"1337_CR8","first-page":"1","volume":"16","author":"D Ju\u00e1rez-Var\u00f3n","year":"2024","unstructured":"Ju\u00e1rez-Var\u00f3n, D., & Ju\u00e1rez-Var\u00f3n, M. \u00c1. (2024). SEO vs. UX in web design: Are companies\u2019 digital marketing strategies correct? a neurotechnological study. International Journal of Software Science and Computational Intelligence (IJSSCI), 16(1), 1\u201326.","journal-title":"International Journal of Software Science and Computational Intelligence (IJSSCI)"},{"issue":"1","key":"1337_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.359767","volume":"20","author":"A Gaurav","year":"2024","unstructured":"Gaurav, A., Chui, K. T., Arya, V., Attar, R. W., Bansal, S., Alhomoud, A., & Psannis, K. (2024). Optimized AI-driven semantic web approach for enhancing phishing detection in e-commerce platforms. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1\u201313.","journal-title":"International Journal on Semantic Web and Information Systems (IJSWIS)"},{"issue":"1","key":"1337_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.334711","volume":"15","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Singh, S. K., Chhabra, A., Kumar, S., Arya, V., & Moslehpour, M. (2023). A novel deep federated learning-based model to enhance privacy in critical infrastructure systems. International Journal of Software Science and Computational Intelligence (IJSSCI), 15(1), 1\u201323.","journal-title":"International Journal of Software Science and Computational Intelligence (IJSSCI)"},{"issue":"1","key":"1337_CR11","first-page":"1","volume":"14","author":"M AlShaikh","year":"2024","unstructured":"AlShaikh, M., Alsemaih, W., Alamri, S., & Ramadan, Q. (2024). Using supervised learning to detect command and control attacks in iot. International Journal of Cloud Applications and Computing (IJCAC), 14(1), 1\u201319.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"1337_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., Gaurav, A., Arya, V., Attar, R. W., Bansal, S., Alhomoud, A., & Tai Chui, K. (2024). Cuckoo search-optimized deep CNN for enhanced cyber security in iot networks. Computers, Materials & Continua 81(3)","DOI":"10.32604\/cmc.2024.056476"},{"key":"1337_CR13","doi-asserted-by":"publisher","first-page":"109944","DOI":"10.1016\/j.compeleceng.2024.109944","volume":"122","author":"BB Gupta","year":"2025","unstructured":"Gupta, B. B., Gaurav, A., Attar, R. W., Arya, V., Bansal, S., Alhomoud, A., & Chui, K. T. (2025). A hybrid ant lion optimization algorithm based lightweight deep learning framework for cyber attack detection in iot environment. Computers and Electrical Engineering, 122, 109944.","journal-title":"Computers and Electrical Engineering"},{"key":"1337_CR14","doi-asserted-by":"crossref","unstructured":"Abid, Y. A., Wu, J., Xu, G., Fu, S., & Waqas, M. (2024). Multi-level deep neural network for distributed denial-of-service attack detection and classification in software-defined networking supported internet of things networks. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3376578"},{"issue":"1","key":"1337_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.339563","volume":"14","author":"A Althunibat","year":"2024","unstructured":"Althunibat, A., Alsawareah, B., Maidin, S. S., Hawashin, B., Jebril, I., Zaqaibeh, B., & Al-khawaja, H. A. (2024). Detecting ambiguities in requirement documents written in Arabic using machine learning algorithms. International Journal of Cloud Applications and Computing (IJCAC), 14(1), 1\u201319.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"1337_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13112034","author":"KI Roumeliotis","year":"2024","unstructured":"Roumeliotis, K. I., Tselikas, N. D., & Nasiopoulos, D. K. (2024). Next-generation spam filtering: Comparative fine-tuning of LLMS, NLPS, and CNN models for email spam classification. Electronics (Switzerland). https:\/\/doi.org\/10.3390\/electronics13112034","journal-title":"Electronics (Switzerland)"},{"issue":"1","key":"1337_CR17","first-page":"1","volume":"20","author":"L Zhou","year":"2024","unstructured":"Zhou, L., Gaurav, A., Arya, V., Attar, R. W., Bansal, S., & Alhomoud, A. (2024). Enhancing phishing detection in semantic web systems using optimized deep learning models. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1\u201313.","journal-title":"International Journal on Semantic Web and Information Systems (IJSWIS)"},{"issue":"1","key":"1337_CR18","first-page":"1","volume":"20","author":"Z Li","year":"2024","unstructured":"Li, Z., Yu, X., & Zhao, Y. (2024). A web semantic mining method for fake cybersecurity threat intelligence in open source communities. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1\u201322.","journal-title":"International Journal on Semantic Web and Information Systems (IJSWIS)"},{"key":"1337_CR19","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/LSP.2024.3394264","volume":"31","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Wen, J., Jia, J., Gao, L., & Zhang, Z. (2024). C-net: A compression-based lightweight network for machine-generated text detection. IEEE Signal Processing Letters, 31, 1269\u20131273. https:\/\/doi.org\/10.1109\/LSP.2024.3394264","journal-title":"IEEE Signal Processing Letters"},{"key":"1337_CR20","doi-asserted-by":"publisher","unstructured":"Chakraborty, S. (2023). Phishing Email Detection. Kaggle https:\/\/doi.org\/10.34740\/KAGGLE\/DSV\/6090437 . https:\/\/www.kaggle.com\/dsv\/6090437","DOI":"10.34740\/KAGGLE\/DSV\/6090437"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01337-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-025-01337-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01337-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T07:26:37Z","timestamp":1757921197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-025-01337-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,18]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["1337"],"URL":"https:\/\/doi.org\/10.1007\/s11235-025-01337-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,18]]},"assertion":[{"value":"24 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"107"}}