{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T13:46:37Z","timestamp":1768225597238,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04709-4","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T10:38:43Z","timestamp":1768214323000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid Machine Learning-Based Detection of Phishing Attacks through E-mails and SMSs in Electronic Vehicles"],"prefix":"10.1007","volume":"7","author":[{"given":"Bhoomika S.","family":"Horapeti","sequence":"first","affiliation":[]},{"given":"Mosiur","family":"Rahaman","sequence":"additional","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"issue":"2","key":"4709_CR1","doi-asserted-by":"publisher","first-page":"420","DOI":"10.3390\/vehicles4020025","volume":"4","author":"Y-Y Lau","year":"2022","unstructured":"Lau Y-Y, Wu AY, Yan MW. A way forward for electric vehicle in greater bay area: Challenges and opportunities for the 21st century. Vehicles. 2022;4(2):420\u201332.","journal-title":"Vehicles"},{"key":"4709_CR2","unstructured":"Lutsey N. Global climate change mitigation potential from a transition to electric vehicles. 2015;5:5 (https:\/\/theicct.org\/publication\/globalclimate-change-mitigation-potential-from-a-transition-to-electricvehicles\/)."},{"key":"4709_CR3","doi-asserted-by":"crossref","unstructured":"Gelmanova Z, Zhabalova G, Sivyakova G, Lelikova O, Onishchenko O, Smailova A, Kamarova S. Electric cars. advantages and disadvantages. J Phys Conferen Ser 1015:052029 (2018). IOP Publishing.","DOI":"10.1088\/1742-6596\/1015\/5\/052029"},{"key":"4709_CR4","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.tranpol.2022.07.021","volume":"126","author":"L Schloter","year":"2022","unstructured":"Schloter L. Empirical analysis of the depreciation of electric vehicles compared to gasoline vehicles. Transp Policy. 2022;126:268\u201379.","journal-title":"Transp Policy"},{"issue":"2","key":"4709_CR5","doi-asserted-by":"publisher","first-page":"420","DOI":"10.3390\/vehicles4020025","volume":"4","author":"Y-Y Lau","year":"2022","unstructured":"Lau Y-Y, Wu AY, Yan MW. A way forward for electric vehicle in greater bay area: Challenges and opportunities for the 21st century. Vehicles. 2022;4(2):420\u201332.","journal-title":"Vehicles"},{"issue":"1","key":"4709_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s12302-020-00307-8","volume":"32","author":"M Weiss","year":"2020","unstructured":"Weiss M, Cloos KC, Helmers E. Energy efficiency trade-offs in small to large electric vehicles. Environ Sci Eur. 2020;32(1):46.","journal-title":"Environ Sci Eur"},{"key":"4709_CR7","doi-asserted-by":"crossref","unstructured":"Bedogni L, Bononi L, D\u2019Elia A, Di\u00a0Felice M, Rondelli S, Cinotti TS. A mobile application to assist electric vehicles\u2019 drivers with charging services. In: 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, pp. 78\u201383 (2014). IEEE.","DOI":"10.1109\/NGMAST.2014.49"},{"key":"4709_CR8","doi-asserted-by":"crossref","unstructured":"Du Y, Veciana G. Mobile applications and algorithms to facilitate electric vehicle deployment. In: 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp. 130\u2013136 (2013). IEEE.","DOI":"10.1109\/CCNC.2013.6488436"},{"key":"4709_CR9","doi-asserted-by":"crossref","unstructured":"Topman N, Adnane A. Mobile applications for connected cars: Security analysis and risk assessment. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2022). IEEE.","DOI":"10.1109\/NOMS54207.2022.9789873"},{"key":"4709_CR10","unstructured":"CybeReady: The Complete Guide to Smishing (SMS Phishing). CybeReady. https:\/\/cybeready.com\/category\/the-complete-guide-to-smishing (2025)."},{"key":"4709_CR11","unstructured":"Centre NCS. Phishing attacks: defending your organisation. National Cyber Security Centre. https:\/\/www.ncsc.gov.uk\/guidance\/phishing (2025)."},{"key":"4709_CR12","unstructured":"Rekarius: Phishing Detection Based on Deep Learning in Cloud Environment. https:\/\/insights2techinfo.com\/phishing-detection-based-on-deep-learning-in-cloud-environment\/. Accessed: 2025-04-25 (2025)."},{"issue":"1","key":"4709_CR13","first-page":"1","volume":"14","author":"A Ishtaiwi","year":"2024","unstructured":"Ishtaiwi A, Ali AM, Al-Qerem A, Sabahean M, Alzubi B, Almomani A, et al. Next-gen phishing defense enhancing detection with machine learning and expert whitelisting\/blacklisting. Int J Cloud Appl Comput (IJCAC). 2024;14(1):1\u201317.","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"issue":"1","key":"4709_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.320499","volume":"15","author":"D Zhu","year":"2023","unstructured":"Zhu D, Tan J, Luo G, Gu H, Ye Z, Deng R, et al. Knowledge discovery of hospital medical technology based on partial ordered structure diagrams. Int J Softw Sci Comput Intell (IJSSCI). 2023;15(1):1\u201316.","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"issue":"5","key":"4709_CR15","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"AK Jain","year":"2019","unstructured":"Jain AK, Gupta BB. A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Humaniz Comput. 2019;10(5):2015\u201328.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4709_CR16","doi-asserted-by":"publisher","first-page":"2550005","DOI":"10.1142\/S2737599425500057","volume":"12","author":"P Elechi","year":"2025","unstructured":"Elechi P, Ekolama SM, Okowa E, Kukuchuku S. A review of emerging technologies in wireless communication systems. Innovat Emerg Technol. 2025;12:2550005.","journal-title":"Innovat Emerg Technol"},{"key":"4709_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100013","volume":"5","author":"D Kosmanos","year":"2020","unstructured":"Kosmanos D, Pappas A, Maglaras L, Moschoyiannis S, Aparicio-Navarro FJ, Argyriou A, et al. A novel intrusion detection system against spoofing attacks in connected electric vehicles. Array. 2020;5:100013.","journal-title":"Array"},{"issue":"4","key":"4709_CR18","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","volume":"15","author":"A Almomani","year":"2013","unstructured":"Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E. A survey of phishing email filtering techniques. IEEE commun surv tutor. 2013;15(4):2070\u201390.","journal-title":"IEEE commun surv tutor"},{"issue":"24","key":"4709_CR19","doi-asserted-by":"publisher","first-page":"3435","DOI":"10.1049\/gtd2.12275","volume":"15","author":"M Basnet","year":"2021","unstructured":"Basnet M, Ali MH. Exploring cybersecurity issues in 5g enabled electric vehicle charging station with deep learning. IET Gener Trans Distrib. 2021;15(24):3435\u201349.","journal-title":"IET Gener Trans Distrib"},{"issue":"5","key":"4709_CR20","doi-asserted-by":"publisher","first-page":"712","DOI":"10.3390\/math13050712","volume":"13","author":"F Makhmudov","year":"2025","unstructured":"Makhmudov F, Kilichev D, Giyosov U, Akhmedov F. Online machine learning for intrusion detection in electric vehicle charging systems. Mathematics. 2025;13(5):712.","journal-title":"Mathematics"},{"key":"4709_CR21","doi-asserted-by":"crossref","unstructured":"Dong H, Kotenko I. Enhancing security in ev charging systems: A hybrid detection and mitigation approach. In: 2024 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 1\u20138 (2024). IEEE.","DOI":"10.1109\/CloudCom62794.2024.00014"},{"issue":"7","key":"4709_CR22","doi-asserted-by":"publisher","first-page":"4975","DOI":"10.1007\/s00521-021-06305-y","volume":"35","author":"S Mishra","year":"2023","unstructured":"Mishra S, Soni D. Dsmishsms-a system to detect smishing sms. Neural Comput Appl. 2023;35(7):4975\u201392.","journal-title":"Neural Comput Appl"},{"issue":"1","key":"4709_CR23","first-page":"1","volume":"15","author":"M Alarqan","year":"2025","unstructured":"Alarqan M, Belaton B, Almomani A, Alauthman M, Al-Betar MA, Arya V. Information theory-based ddos attack detection in cloud computing: A systematic survey of approaches. Int J Cloud Appl Comput (IJCAC). 2025;15(1):1\u201338.","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"4709_CR24","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.future.2020.03.021","volume":"108","author":"S Mishra","year":"2020","unstructured":"Mishra S, Soni D. Smishing detector: A security model to detect smishing through sms content analysis and url behavior analysis. Futur Gener Comput Syst. 2020;108:803\u201315.","journal-title":"Futur Gener Comput Syst"},{"key":"4709_CR25","doi-asserted-by":"crossref","unstructured":"Wilson B, Mansour C. Security of electric vehicles: A brief survey. In: 2024 7th International Conference on Information and Communications Technology (ICOIACT), pp. 125\u2013129 (2024). IEEE.","DOI":"10.1109\/ICOIACT64819.2024.10913368"},{"key":"4709_CR26","doi-asserted-by":"crossref","unstructured":"Joy AM, Ravi A, Roy J, Karthikeyan GV, Rajan TP. Iot enabled electronic security & remote monitoring solution for electric bikes. In: 2022 IEEE International Power and Renewable Energy Conference (IPRECON), pp. 1\u20136 (2022). IEEE.","DOI":"10.1109\/IPRECON55716.2022.10059526"},{"key":"4709_CR27","doi-asserted-by":"crossref","unstructured":"Muhammad Z, Anwar Z, Saleem B. A cybersecurity risk assessment of electric vehicle mobile applications: Findings and recommendations. In: 2023 3rd International Conference on Artificial Intelligence (ICAI), pp. 45\u201351 (2023). IEEE.","DOI":"10.1109\/ICAI58407.2023.10136682"},{"key":"4709_CR28","unstructured":"Hanelt A, Nastjuk I, Kr\u00fcp H, Eisel M, Ebermann C, Brauer B, Piccinini E, Hildebrandt B, Kolbe LM. Disruption on the way? the role of mobile applications for electric vehicle diffusion (2015)."},{"issue":"3","key":"4709_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11235-025-01337-4","volume":"88","author":"A Gaurav","year":"2025","unstructured":"Gaurav A, Pan VS-H, Arya V, Attar RW, Alhazmi AH, Alhomoud A, et al. Defense-optimized bert architecture against digital arrest attacks in intelligent systems: A. Gaurav et al. Telecommun Syst. 2025;88(3):107.","journal-title":"Telecommun Syst"},{"key":"4709_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109944","volume":"122","author":"BB Gupta","year":"2025","unstructured":"Gupta BB, Gaurav A, Attar RW, Arya V, Bansal S, Alhomoud A, et al. A hybrid ant lion optimization algorithm based lightweight deep learning framework for cyber attack detection in iot environment. Comput Electr Eng. 2025;122:109944.","journal-title":"Comput Electr Eng"},{"issue":"3","key":"4709_CR31","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/fi13030058","volume":"13","author":"E Chatzoglou","year":"2021","unstructured":"Chatzoglou E, Kambourakis G, Kouliaridis V. A multi-tier security analysis of official car management apps for android. Future Internet. 2021;13(3):58.","journal-title":"Future Internet"},{"key":"4709_CR32","volume":"2","author":"V Vajrobol","year":"2024","unstructured":"Vajrobol V, Gupta BB, Gaurav A. Mutual information based logistic regression for phishing url detection. Cyber Secur Appl. 2024;2:100044.","journal-title":"Cyber Secur Appl"},{"issue":"4","key":"4709_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3609508","volume":"7","author":"K Sarieddine","year":"2023","unstructured":"Sarieddine K, Sayed MA, Torabi S, Atallah R, Assi C. Investigating the security of ev charging mobile applications as an attack surface. ACM Trans Cyber-Phys Syst. 2023;7(4):1\u201328.","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"4709_CR34","doi-asserted-by":"crossref","unstructured":"Stillwater T, Woodjack J, Nicholas M. Mobile app support for electric vehicle drivers: a review of today\u2019s marketplace and future directions. In: International Conference on Human-Computer Interaction, pp. 640\u2013646 (2013). Springer.","DOI":"10.1007\/978-3-642-39262-7_72"},{"key":"4709_CR35","unstructured":"Thomhave K. Most EV owners use their car brand\u2019s mobile app: JD Power. https:\/\/www.wardsauto.com\/news\/archive-auto-ev-owners-car-brands-mobile-app-jd-power-survey\/719300\/. Accessed: 2025-04-25 (2024)."},{"key":"4709_CR36","unstructured":"Venkatesh V. Spam Mails Dataset. https:\/\/www.kaggle.com\/datasets\/venky73\/spam-mails-dataset. Accessed: 2025-04-25 (2018)."},{"key":"4709_CR37","doi-asserted-by":"publisher","unstructured":"Almeida T, Hidalgo J. SMS Spam Collection. UCI Machine Learning Repository. https:\/\/doi.org\/10.24432\/C5CC84 (2011).","DOI":"10.24432\/C5CC84"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04709-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04709-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04709-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T10:39:00Z","timestamp":1768214340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04709-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["4709"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04709-4","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"21 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}}],"article-number":"94"}}