{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:13Z","timestamp":1775745493086,"version":"3.50.1"},"reference-count":113,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Deanship of Scientific Research at King Khalid University","award":["RGP2\/428\/46"],"award-info":[{"award-number":["RGP2\/428\/46"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00202-9","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T11:27:27Z","timestamp":1759231647000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Phishing detection in IoT: an integrated CNN-LSTM framework with explainable AI and LLM-enhanced analysis"],"prefix":"10.1007","volume":"5","author":[{"given":"Sara Mohammed","family":"Alasmari","sequence":"first","affiliation":[]},{"given":"Houneida","family":"Sakly","sequence":"additional","affiliation":[]},{"given":"Naoufel","family":"Kraiem","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Algarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"202_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/s20216076","volume":"20","author":"R Krishnamurthi","year":"2020","unstructured":"Krishnamurthi R, Kumar A, Gopinathan D, Nayyar A, Qureshi B. An overview of IoT sensor data processing. Fusion, Anal Techn, Sens. 2020;20: 21. https:\/\/doi.org\/10.3390\/s20216076.","journal-title":"Fusion, Anal Techn, Sens"},{"key":"202_CR2","doi-asserted-by":"publisher","first-page":"100118","DOI":"10.1016\/j.iot.2019.100118","volume":"8","author":"SS Gill","year":"2019","unstructured":"Gill SS, et al. Transformative effects of IoT, blockchain and artificial intelligence on cloud computing: evolution, vision, trends and open challenges. Internet of Things. 2019;8:100118. https:\/\/doi.org\/10.1016\/j.iot.2019.100118.","journal-title":"Internet of Things"},{"key":"202_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010016","volume":"11","author":"W Ahmad","year":"2022","unstructured":"Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in IoT-based cloud computing: a comprehensive survey. Electronics. 2022;11: 1. https:\/\/doi.org\/10.3390\/electronics11010016.","journal-title":"Electronics"},{"issue":"4","key":"202_CR4","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","volume":"20","author":"E Benkhelifa","year":"2018","unstructured":"Benkhelifa E, Welsh T, Hamouda W. A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutor. 2018;20(4):3496\u2013509. https:\/\/doi.org\/10.1109\/COMST.2018.2844742.","journal-title":"IEEE Commun Surv Tutor"},{"key":"202_CR5","doi-asserted-by":"publisher","first-page":"103648","DOI":"10.1016\/j.jnca.2023.103648","volume":"216","author":"S Tuli","year":"2023","unstructured":"Tuli S, et al. AI augmented edge and fog computing: trends and challenges. J Netw Comput Appl. 2023;216:103648. https:\/\/doi.org\/10.1016\/j.jnca.2023.103648.","journal-title":"J Netw Comput Appl"},{"key":"202_CR6","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.iotcps.2023.04.006","volume":"3","author":"M Soori","year":"2023","unstructured":"Soori M, Arezoo B, Dastres R. Internet of things for smart factories in industry 4.0, a review. Internet of Things Cyber-Phys Syst. 2023;3:192\u2013204. https:\/\/doi.org\/10.1016\/j.iotcps.2023.04.006.","journal-title":"Internet of Things Cyber-Phys Syst"},{"key":"202_CR7","doi-asserted-by":"publisher","first-page":"101318","DOI":"10.1016\/j.iot.2024.101318","volume":"27","author":"A Marengo","year":"2024","unstructured":"Marengo A. Navigating the nexus of AI and IoT: a comprehensive review of data analytics and privacy paradigms. Internet of Things. 2024;27:101318. https:\/\/doi.org\/10.1016\/j.iot.2024.101318.","journal-title":"Internet of Things"},{"key":"202_CR8","doi-asserted-by":"publisher","first-page":"100084","DOI":"10.1016\/j.csa.2025.100084","volume":"3","author":"A Wakili","year":"2025","unstructured":"Wakili A, Bakkali S. Privacy-preserving security of IoT networks: a comparative analysis of methods and applications. Cyber Secur Appl. 2025;3:100084. https:\/\/doi.org\/10.1016\/j.csa.2025.100084.","journal-title":"Cyber Secur Appl"},{"issue":"7","key":"202_CR9","doi-asserted-by":"publisher","first-page":"4191","DOI":"10.1016\/j.jksuci.2022.05.003","volume":"34","author":"J Koo","year":"2022","unstructured":"Koo J, Kim Y-G. Resource identifier interoperability among heterogeneous IoT platforms. J King Saud Univ - Comput Inform Sci. 2022;34(7):4191\u2013208. https:\/\/doi.org\/10.1016\/j.jksuci.2022.05.003.","journal-title":"J King Saud Univ - Comput Inform Sci"},{"key":"202_CR10","unstructured":"Awareness of Phishing Attacks in Institutions of Higher Learning: A Review of Types and Technical Approaches. International Journal of Research and Innovation in Applied Science (IJRIAS). Consult\u00e9 le: 30 mars 2025. [En ligne]. Disponible sur: https:\/\/rsisinternational.org\/journals\/ijrias\/articles\/awareness-of-phishing-attacks-in-institutions-of-higher-learning-a-review-of-types-and-technical-approaches\/"},{"key":"202_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine F, Kaabouch N. Social engineering attacks: a survey. Future Internet. 2019;11: 4. https:\/\/doi.org\/10.3390\/fi11040089.","journal-title":"Future Internet"},{"key":"202_CR12","doi-asserted-by":"publisher","first-page":"102685","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin M, Maghanaki M, Hosseinzadeh A, Chen FF. Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Adv Eng Inform. 2024;62:102685. https:\/\/doi.org\/10.1016\/j.aei.2024.102685.","journal-title":"Adv Eng Inform"},{"key":"202_CR13","doi-asserted-by":"publisher","first-page":"100543","DOI":"10.1016\/j.prime.2024.100543","volume":"8","author":"C Singh","year":"2024","unstructured":"Singh C, Jain AK. A comprehensive survey on DDoS attacks detection & mitigation in SDN-IoT network. e-Prime - Adv Electric Eng, Electron Energy. 2024;8:100543. https:\/\/doi.org\/10.1016\/j.prime.2024.100543.","journal-title":"e-Prime - Adv Electric Eng, Electron Energy"},{"issue":"10","key":"202_CR14","doi-asserted-by":"publisher","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","volume":"35","author":"A Nazir","year":"2023","unstructured":"Nazir A, et al. Advancing IoT security: a systematic review of machine learning approaches for the detection of IoT botnets. J King Saud Univ \u2013 Comput Inform Sci. 2023;35(10):101820. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101820.","journal-title":"J King Saud Univ \u2013 Comput Inform Sci"},{"issue":"1","key":"202_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11277-022-09548-7","volume":"125","author":"Y Labiod","year":"2022","unstructured":"Labiod Y, Amara Korba A, Ghoualmi N. Fog computing-based intrusion detection architecture to protect IoT networks. Wireless Pers Commun. 2022;125(1):231\u201359. https:\/\/doi.org\/10.1007\/s11277-022-09548-7.","journal-title":"Wireless Pers Commun"},{"key":"202_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12040051","volume":"12","author":"KB Adedeji","year":"2023","unstructured":"Adedeji KB, Abu-Mahfouz AM, Kurien AM. DDoS attack and detection methods in internet-enabled networks: concept, research perspectives, and challenges. J Sens Actuator Netw. 2023;12: 4. https:\/\/doi.org\/10.3390\/jsan12040051.","journal-title":"J Sens Actuator Netw"},{"key":"202_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/s22208072","volume":"22","author":"F Amin","year":"2022","unstructured":"Amin F, Abbasi R, Mateen A, Ali Abid M, Khan S. A step toward next-generation advancements in the internet of things technologies. Sensors. 2022;22: 20. https:\/\/doi.org\/10.3390\/s22208072.","journal-title":"Sensors"},{"key":"202_CR18","doi-asserted-by":"publisher","DOI":"10.3390\/su132212384","volume":"13","author":"Z Hussain","year":"2021","unstructured":"Hussain Z, Akhunzada A, Iqbal J, Bibi I, Gani A. Secure IIoT-enabled industry 4.0. Sustainability. 2021;13: 22. https:\/\/doi.org\/10.3390\/su132212384.","journal-title":"Sustainability"},{"key":"202_CR19","doi-asserted-by":"publisher","unstructured":"Azzedin F, Alhejri I. A Layered Taxonomy of Internet of Things Attacks. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems, in ICFNDS \u201922. New York, NY, USA: Association for Computing Machinery. 2023, p. 631\u2011636. https:\/\/doi.org\/10.1145\/3584202.3584297.","DOI":"10.1145\/3584202.3584297"},{"key":"202_CR20","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.12789572","volume":"2","author":"D Li","year":"2024","unstructured":"Li D, Chen Q, Wang L. Phishing attacks: detection and prevention techniques. J Ind Eng Appl Sci. 2024;2: 4. https:\/\/doi.org\/10.5281\/zenodo.12789572.","journal-title":"J Ind Eng Appl Sci"},{"key":"202_CR21","doi-asserted-by":"publisher","unstructured":"S. Priya, D. Gutema, S. Singh. A Comprehensive Survey of Recent Phishing Attacks Detection Techniques. In: 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT). 2024. p. 1\u20116. https:\/\/doi.org\/10.1109\/ICITIIT61487.2024.10580446.","DOI":"10.1109\/ICITIIT61487.2024.10580446"},{"key":"202_CR22","doi-asserted-by":"publisher","unstructured":"Atari M, Al-Mousa A. A Machine-Learning Based Approach for Detecting Phishing URLs. In: 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA). 2022. p. 82\u201188. https:\/\/doi.org\/10.1109\/IDSTA55301.2022.9923050.","DOI":"10.1109\/IDSTA55301.2022.9923050"},{"key":"202_CR23","unstructured":"Phishing Threats in IoT-Based Systems: Detection and Mitigation Techniques. Insights2Techinfo. Consult\u00e9 le: 30 mars 2025. [En ligne]. Disponible sur: https:\/\/insights2techinfo.com\/phishing-threats-in-iot-based-systems-detection-and-mitigation-techniques\/"},{"key":"202_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/app142210086","volume":"14","author":"QE ul Haq","year":"2024","unstructured":"ul Haq QE, Faheem MH, Ahmad I. Detecting phishing URLs based on a deep learning approach to prevent cyber-attacks. Appl Sci. 2024;14: 22. https:\/\/doi.org\/10.3390\/app142210086.","journal-title":"Appl Sci"},{"issue":"11","key":"202_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(21)00118-4","volume":"2021","author":"K Kaushik","year":"2021","unstructured":"Kaushik K, Singh S, Garg S, Singhal S, Pandey S. Exploring the mechanisms of phishing. Comput Fraud Secur. 2021;2021(11):14\u20139. https:\/\/doi.org\/10.1016\/S1361-3723(21)00118-4.","journal-title":"Comput Fraud Secur"},{"issue":"1","key":"202_CR26","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2021","unstructured":"Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst. 2021;76(1):139\u201354. https:\/\/doi.org\/10.1007\/s11235-020-00733-2.","journal-title":"Telecommun Syst"},{"key":"202_CR27","doi-asserted-by":"publisher","unstructured":"Shukla P. ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In: 2017 Intelligent Systems Conference (IntelliSys); 2017, p. 234\u2011240. https:\/\/doi.org\/10.1109\/IntelliSys.2017.8324298.","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"202_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119530","author":"AK Sangaiah","year":"2023","unstructured":"Sangaiah AK, Javadpour A, Pinto P. Towards data security assessments using an IDS security model for cyber-physical smart cities. Inf Sci. 2023. https:\/\/doi.org\/10.1016\/j.ins.2023.119530.","journal-title":"Inf Sci"},{"key":"202_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu H, Lang B. Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci. 2019;9: 20. https:\/\/doi.org\/10.3390\/app9204396.","journal-title":"Appl Sci"},{"key":"202_CR30","doi-asserted-by":"publisher","first-page":"112963","DOI":"10.1016\/j.eswa.2019.112963","volume":"141","author":"M Lopez-Martin","year":"2020","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A. Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl. 2020;141:112963. https:\/\/doi.org\/10.1016\/j.eswa.2019.112963.","journal-title":"Expert Syst Appl"},{"key":"202_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/info11070344","volume":"11","author":"A Zainab","year":"2020","unstructured":"Zainab A, Refaat SS, Bouhali O. Ensemble-based spam detection in smart home IoT devices time series data using machine learning techniques. Information. 2020;11: 7. https:\/\/doi.org\/10.3390\/info11070344.","journal-title":"Information"},{"key":"202_CR32","doi-asserted-by":"publisher","DOI":"10.5373\/ijhs.v6nS3.7944","volume":"6","author":"MC Singh","year":"2022","unstructured":"Singh MC, Sumanth P, Sathyanarayana SB, Rithika G. Phishing email detection using deep learning algorithms. Int J Health Sci. 2022;6: S3. https:\/\/doi.org\/10.5373\/ijhs.v6nS3.7944.","journal-title":"Int J Health Sci"},{"key":"202_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091514","volume":"9","author":"A Aljofey","year":"2020","unstructured":"Aljofey A, Jiang Q, Qu Q, Huang M, Niyigena J-P. An effective phishing detection model based on character level convolutional neural network from URL. Electronics. 2020;9: 9. https:\/\/doi.org\/10.3390\/electronics9091514.","journal-title":"Electronics"},{"key":"202_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/s23094403","volume":"23","author":"EA Aldakheel","year":"2023","unstructured":"Aldakheel EA, Zakariah M, Gashgari GA, Almarshad FA, Alzahrani AIA. A deep learning-based innovative technique for phishing detection in modern security with uniform resource locators. Sensors. 2023;23: 9. https:\/\/doi.org\/10.3390\/s23094403.","journal-title":"Sensors"},{"key":"202_CR35","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2402.17092","author":"V Nguyen","year":"2024","unstructured":"Nguyen V, Wu T, Yuan X, Grobler M, Nepal S, Rudolph C. An innovative information theory-based approach to tackle and enhance the transparency in phishing detection. arXiv. 2024. https:\/\/doi.org\/10.4855\/arXiv.2402.17092.","journal-title":"arXiv"},{"key":"202_CR36","doi-asserted-by":"publisher","first-page":"03004","DOI":"10.1051\/itmconf\/20203203004","volume":"32","author":"T Doke","year":"2020","unstructured":"Doke T, Khismatrao P, Jambhale V, Marathe N. Phishing-inspector: detection & prevention of phishing websites. ITM Web Conf. 2020;32:03004. https:\/\/doi.org\/10.1051\/itmconf\/20203203004.","journal-title":"ITM Web Conf"},{"key":"202_CR37","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2205.07411","author":"DM Divakaran","year":"2022","unstructured":"Divakaran DM, Oest A. Phishing detection leveraging machine learning and deep learning: a review. arXiv. 2022. https:\/\/doi.org\/10.4855\/arXiv.2205.07411.","journal-title":"arXiv"},{"issue":"9","key":"202_CR38","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.3844\/jcssp.2024.1069.1079","volume":"20","author":"H Bibi","year":"2024","unstructured":"Bibi H, et al. Phishing website detection using improved multilayered convolutional neural networks. J Comput Sci. 2024;20(9):1069\u201379. https:\/\/doi.org\/10.3844\/jcssp.2024.1069.1079.","journal-title":"J Comput Sci"},{"key":"202_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/fi16030086","volume":"16","author":"PKK Loh","year":"2024","unstructured":"Loh PKK, Lee AZY, Balachandran V. Towards a hybrid security framework for phishing awareness education and defense. Future Internet. 2024;16: 3. https:\/\/doi.org\/10.3390\/fi16030086.","journal-title":"Future Internet"},{"key":"202_CR40","doi-asserted-by":"publisher","unstructured":"Sahit S, Vaishnavi S, Vaibhav Reddy A, Chaitra M. AI Sentries: Evaluating Machine Learning Models for Superior Phishing Email Detection, In: 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). 2024, p. 1\u20115. https:\/\/doi.org\/10.1109\/CSITSS64042.2024.10817065.","DOI":"10.1109\/CSITSS64042.2024.10817065"},{"key":"202_CR41","doi-asserted-by":"publisher","unstructured":"M. Jouhari, M. Guizani, Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices. In: 2024 International Wireless Communications and Mobile Computing (IWCMC). 2024. p. 1558\u20111563. https:\/\/doi.org\/10.1109\/IWCMC61514.2024.10592352.","DOI":"10.1109\/IWCMC61514.2024.10592352"},{"key":"202_CR42","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2408.14045","author":"A Diaf","year":"2024","unstructured":"Diaf A, Korba AA, Karabadji NE, Ghamri-Doudane Y. Beyond detection: leveraging large language models for cyber attack prediction in IoT networks. arXiv. 2024. https:\/\/doi.org\/10.4855\/arXiv.2408.14045.","journal-title":"arXiv"},{"key":"202_CR43","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010232","volume":"12","author":"Z Alshingiti","year":"2023","unstructured":"Alshingiti Z, Alaqel R, Al-Muhtadi J, Haq QEU, Saleem K, Faheem MH. A deep learning-based phishing detection system using CNN, LSTM, and LSTM-CNN. Electronics. 2023;12: 1. https:\/\/doi.org\/10.3390\/electronics12010232.","journal-title":"Electronics"},{"key":"202_CR44","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-981-99-1620-7_12","volume-title":"Machine intelligence and data science applications","author":"M Kava","year":"2023","unstructured":"Kava M, Gupta RK, Bharti S, Kumar A. Deep learning-based framework for URL phishing detection. In: Ramdane-Cherif TP, Singh R, Tomar T, Choudhury J-S, editors. Machine intelligence and data science applications. Singapore: Springer Nature; 2023. p. 143\u201360. https:\/\/doi.org\/10.1007\/978-981-99-1620-7_12."},{"issue":"1","key":"202_CR45","doi-asserted-by":"publisher","first-page":"109","DOI":"10.32604\/csse.2022.020414","volume":"41","author":"Z Al-Mekhlafi","year":"2021","unstructured":"Al-Mekhlafi Z, et al. Phishing websites detection by using optimized stacking ensemble model. CSSE. 2021;41(1):109\u201325. https:\/\/doi.org\/10.32604\/csse.2022.020414.","journal-title":"CSSE"},{"key":"202_CR46","doi-asserted-by":"publisher","first-page":"104347","DOI":"10.1016\/j.engappai.2021.104347","volume":"104","author":"A Hannousse","year":"2021","unstructured":"Hannousse A, Yahiouche S. Towards benchmark datasets for machine learning based website phishing detection: an experimental study. Eng Appl Artif Intell. 2021;104:104347. https:\/\/doi.org\/10.1016\/j.engappai.2021.104347.","journal-title":"Eng Appl Artif Intell"},{"key":"202_CR47","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew KL, Tan CL, Wong K, Yong KSC, Tiong WK. A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf Sci. 2019;484:153\u201366. https:\/\/doi.org\/10.1016\/j.ins.2019.01.064.","journal-title":"Inf Sci"},{"key":"202_CR48","doi-asserted-by":"publisher","first-page":"106304","DOI":"10.1016\/j.dib.2020.106304","volume":"32","author":"AK Singh","year":"2020","unstructured":"Singh AK. Malicious and benign webpages dataset. Data Brief. 2020;32:106304. https:\/\/doi.org\/10.1016\/j.dib.2020.106304.","journal-title":"Data Brief"},{"key":"202_CR49","doi-asserted-by":"publisher","first-page":"121183","DOI":"10.1016\/j.eswa.2023.121183","volume":"236","author":"C Opara","year":"2024","unstructured":"Opara C, Chen Y, Wei B. Look before you leap: detecting phishing web pages by exploiting raw URL and HTML characteristics. Expert Syst Appl. 2024;236:121183. https:\/\/doi.org\/10.1016\/j.eswa.2023.121183.","journal-title":"Expert Syst Appl"},{"key":"202_CR50","doi-asserted-by":"publisher","unstructured":"B. Liu et al. A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 2018. p. 654\u2011665. https:\/\/doi.org\/10.1109\/DSN.2018.00072.","DOI":"10.1109\/DSN.2018.00072"},{"key":"202_CR51","unstructured":"T. Holgers, D. E. Watson, S. D. Gribble, Cutting through the confusion: a measurement study of homograph attacks. In: Proceedings of the annual conference on USENIX \u201906 Annual Technical Conference, in ATEC \u201906. USA: USENIX Association. 2006. p. 24."},{"key":"202_CR52","doi-asserted-by":"publisher","unstructured":"F. Quinkert, T. Lauinger, W. Robertson, E. Kirda, T. Holz. It\u2019s Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. In: 2019 IEEE Conference on Communications and Network Security (CNS). 2019. p. 259\u2011267. https:\/\/doi.org\/10.1109\/CNS.2019.8802671.","DOI":"10.1109\/CNS.2019.8802671"},{"key":"202_CR53","doi-asserted-by":"publisher","unstructured":"V. Krammer, Phishing defense against IDN address spoofing attacks. In Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, in PST \u201906. New York, NY, USA: Association for Computing Machinery. 2006. p. 1\u20119. https:\/\/doi.org\/10.1145\/1501434.1501473.","DOI":"10.1145\/1501434.1501473"},{"key":"202_CR54","doi-asserted-by":"publisher","first-page":"536","DOI":"10.2197\/ipsjjip.27.536","volume":"27","author":"Y Sawabe","year":"2019","unstructured":"Sawabe Y, Chiba D, Akiyama M, Goto S. Detection method of homograph internationalized domain names with OCR. J Inf Process. 2019;27:536\u201344. https:\/\/doi.org\/10.2197\/ipsjjip.27.536.","journal-title":"J Inf Process"},{"key":"202_CR55","doi-asserted-by":"publisher","unstructured":"H. Shirazi, B. Bezawada, I. Ray, \u201cKn0w Thy Doma1n Name\u201d: Unbiased Phishing Detection Using Domain Name Based Features. In: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, in SACMAT \u201918. New York, NY, USA: Association for Computing Machinery. 2018. p. 69\u201175. https:\/\/doi.org\/10.1145\/3205977.3205992.","DOI":"10.1145\/3205977.3205992"},{"issue":"1","key":"202_CR56","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s13673-017-0098-1","volume":"7","author":"M Zouina","year":"2017","unstructured":"Zouina M, Outtaj B. A novel lightweight URL phishing detection system using SVM and similarity index. HCIS. 2017;7(1):17. https:\/\/doi.org\/10.1186\/s13673-017-0098-1.","journal-title":"HCIS"},{"key":"202_CR57","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-22312-0_1","volume-title":"ICT systems security and privacy protection","author":"TP Thao","year":"2019","unstructured":"Thao TP, Sawaya Y, Nguyen-Son H-Q, Yamada A, Omote K, Kubota A. Hunting brand domain forgery: a scalable classification for homograph attack. In: Dhillon F, Hedstr\u00f6m K, Z\u00faquete A, editors. ICT systems security and privacy protection. Cham: Springer International Publishing; 2019. p. 3\u201318. https:\/\/doi.org\/10.1007\/978-3-030-22312-0_1."},{"key":"202_CR58","doi-asserted-by":"publisher","unstructured":"Detecting phishing attacks using a combined model of LSTM and CNN, International Journal of Advanced and Applied Sciences. 2020; 7(7): 56\u201167. https:\/\/doi.org\/10.2183\/ijaas.2020.07.007.","DOI":"10.2183\/ijaas.2020.07.007"},{"issue":"7","key":"202_CR59","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1007\/s00521-021-06401-z","volume":"35","author":"A Ozcan","year":"2023","unstructured":"Ozcan A, Catal C, Donmez E, Senturk B. A hybrid DNN\u2013LSTM model for detecting phishing URLs. Neural Comput Appl. 2023;35(7):4957\u201373. https:\/\/doi.org\/10.1007\/s00521-021-06401-z.","journal-title":"Neural Comput Appl"},{"key":"202_CR60","doi-asserted-by":"publisher","first-page":"76368","DOI":"10.1109\/ACCESS.2020.2989126","volume":"8","author":"ES Gualberto","year":"2020","unstructured":"Gualberto ES, De Sousa RT, De B. Vieira TP, Da Costa JPCL, Duque CG. From feature engineering and topics models to enhanced prediction rates in phishing detection. IEEE Access. 2020;8:76368\u201385. https:\/\/doi.org\/10.1109\/ACCESS.2020.2989126.","journal-title":"IEEE Access"},{"key":"202_CR61","doi-asserted-by":"publisher","DOI":"10.3390\/app122312055","volume":"12","author":"X Zhang","year":"2022","unstructured":"Zhang X, Fan J, Hei M. Compressing BERT for binary text classification via adaptive truncation before fine-tuning. Appl Sci. 2022;12: 23. https:\/\/doi.org\/10.3390\/app122312055.","journal-title":"Appl Sci"},{"issue":"4","key":"202_CR62","doi-asserted-by":"publisher","first-page":"5115","DOI":"10.1109\/TNSM.2023.3282740","volume":"20","author":"G Rjoub","year":"2023","unstructured":"Rjoub G, et al. A survey on explainable artificial intelligence for cybersecurity. IEEE Trans Network Serv Manag. 2023;20(4):5115\u201340. https:\/\/doi.org\/10.1109\/TNSM.2023.3282740.","journal-title":"IEEE Trans Network Serv Manag"},{"key":"202_CR63","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2307.09288","author":"H Touvron","year":"2023","unstructured":"Touvron H, et al. Llama 2: open foundation and fine-tuned chat models. asrXiv. 2023. https:\/\/doi.org\/10.4855\/arXiv.2307.09288.","journal-title":"asrXiv"},{"key":"202_CR64","unstructured":"S. M. Lundberg, S.-I. Lee. A Unified Approach to Interpreting Model Predictions. In: Advances in Neural Information Processing Systems, Curran Associates, Inc., 2017. Consult\u00e9 le: 29 juin 2025. [En ligne]. Disponible sur: https:\/\/papers.nips.cc\/paper_files\/paper\/2017\/hash\/8a20a8621978632d76c43dfd28b67767-Abstract.html."},{"key":"202_CR65","doi-asserted-by":"publisher","unstructured":"R. Alenezi, S. A. Ludwig, Explainability of Cybersecurity Threats Data Using SHAP. In: 2021 IEEE Symposium Series on Computational Intelligence (SSCI). 2021. p. 01\u201110. https:\/\/doi.org\/10.1109\/SSCI50451.2021.9659888.","DOI":"10.1109\/SSCI50451.2021.9659888"},{"key":"202_CR66","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2411.06860","author":"A Fajar","year":"2024","unstructured":"Fajar A, Yazid S, Budi I. Enhancing phishing detection through feature importance analysis and explainable AI: a comparative study of CatBoost, XGBoost, and EBM models. arXiv. 2024. https:\/\/doi.org\/10.4855\/arXiv.2411.06860.","journal-title":"arXiv"},{"key":"202_CR67","doi-asserted-by":"publisher","DOI":"10.6193\/2224-9028.1604","author":"BD Shendkar","year":"2024","unstructured":"Shendkar BD, Chandre PR, Madachane SS, Kulkarni N, Deshmukh S. Enhancing phishing attack detection using explainable AI: trends and innovations. ASEAN J Sci Technol Dev. 2024. https:\/\/doi.org\/10.6193\/2224-9028.1604.","journal-title":"ASEAN J Sci Technol Dev"},{"key":"202_CR68","volume-title":"Generative Ai and large language models for cyber security: all insights you need","author":"MA Ferrag","year":"2024","unstructured":"Ferrag MA, Alwahedi F, Battah A, Cherif B, Mechri A, Tihanyi N. Generative Ai and large language models for cyber security: all insights you need. Rochester: Social Science Research Network; 2024."},{"key":"202_CR69","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2405.04760","author":"H Xu","year":"2025","unstructured":"Xu H, et al. Large language models for cyber security: a systematic literature review. rXiv. 2025. https:\/\/doi.org\/10.4855\/arXiv.2405.04760.","journal-title":"rXiv"},{"key":"202_CR70","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2404.13161","author":"M Bhatt","year":"2024","unstructured":"Bhatt M, et al. CyberSecEval 2: a wide-ranging cybersecurity evaluation suite for large language models. ArXiv. 2024. https:\/\/doi.org\/10.4855\/arXiv.2404.13161.","journal-title":"ArXiv"},{"key":"202_CR71","doi-asserted-by":"publisher","unstructured":"M. Mia, D. Derakhshan, M. M. A. Pritom, Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI. In: Proceedings of the 11th International Conference on Networking, Systems, and Security. 2024. p. 137\u2011145. https:\/\/doi.org\/10.1145\/3704522.3704532.","DOI":"10.1145\/3704522.3704532"},{"key":"202_CR72","doi-asserted-by":"publisher","DOI":"10.3390\/fi16010031","volume":"16","author":"Z Fan","year":"2024","unstructured":"Fan Z, Li W, Laskey KB, Chang K-C. Investigation of phishing susceptibility with explainable artificial intelligence. Future Internet. 2024;16: 1. https:\/\/doi.org\/10.3390\/fi16010031.","journal-title":"Future Internet"},{"key":"202_CR73","doi-asserted-by":"publisher","unstructured":"T. M. Ghazal, J. I. Janjua, W. Abushiba, M. Ahmad, A. Ihsan, N. A. Al-Dmour. Cybersecurity Revolution via Large Language Models and Explainable AI. In: 2024 17th International Conference on Security of Information and Networks (SIN). 2024. p. 1\u20116. https:\/\/doi.org\/10.1109\/SIN63213.2024.10871324.","DOI":"10.1109\/SIN63213.2024.10871324"},{"key":"202_CR74","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.1705.07874","author":"S Lundberg","year":"2017","unstructured":"Lundberg S, Lee S-I. A unified approach to interpreting model predictions. arXiv. 2017. https:\/\/doi.org\/10.4855\/arXiv.1705.07874.","journal-title":"arXiv"},{"key":"202_CR75","doi-asserted-by":"publisher","first-page":"104318","DOI":"10.1016\/j.cose.2025.104318","volume":"151","author":"CS Kalutharage","year":"2025","unstructured":"Kalutharage CS, Liu X, Chrysoulas C. Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response. Comput Secur. 2025;151:104318. https:\/\/doi.org\/10.1016\/j.cose.2025.104318.","journal-title":"Comput Secur"},{"key":"202_CR76","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-86797-3_17","volume-title":"Innovation through information systems","author":"K Kluge","year":"2021","unstructured":"Kluge K, Eckhardt R. Explaining the suspicion: design of an XAI-Based user-focused anti-phishing measure. In: Ahlemann F, Sch\u00fctte R, editors. Innovation through information systems. Cham: Springer International Publishing; 2021. p. 247\u201361. https:\/\/doi.org\/10.1007\/978-3-030-86797-3_17."},{"key":"202_CR77","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.procs.2021.07.040","volume":"191","author":"K Haynes","year":"2021","unstructured":"Haynes K, Shirazi H, Ray I. Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. Procedia Comput Sci. 2021;191:127\u201334. https:\/\/doi.org\/10.1016\/j.procs.2021.07.040.","journal-title":"Procedia Comput Sci"},{"key":"202_CR78","doi-asserted-by":"publisher","unstructured":"S. J. Bu, S. B. Cho, Phishing URL Detection with Prototypical Neural Network Disentangled by Triplet Sampling: 16th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2023 and 14th International Conference on EUropean Transnational Education, ICEUTE 2023. In: International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023) - Proceedings, p. 132\u2011143. 2023. https:\/\/doi.org\/10.1007\/978-3-031-42519-6_13.","DOI":"10.1007\/978-3-031-42519-6_13"},{"issue":"9","key":"202_CR79","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s10462-024-10877-1","volume":"57","author":"P Mittal","year":"2024","unstructured":"Mittal P. A comprehensive survey of deep learning-based lightweight object detection models for edge devices. Artif Intell Rev. 2024;57(9):242. https:\/\/doi.org\/10.1007\/s10462-024-10877-1.","journal-title":"Artif Intell Rev"},{"key":"202_CR80","doi-asserted-by":"publisher","unstructured":"H. V. Pham, T. G. Tran, C. D. Le, A. D. Le, H. B. Vo. Benchmarking Jetson Edge Devices with an End-to-end Video-based Anomaly Detection System. 2024; 920: 358\u2011374. https:\/\/doi.org\/10.1007\/978-3-031-53963-3_25.","DOI":"10.1007\/978-3-031-53963-3_25"},{"issue":"9","key":"202_CR81","doi-asserted-by":"publisher","DOI":"10.3390\/s21092984","volume":"21","author":"P-E Novac","year":"2021","unstructured":"Novac P-E, Boukli Hacene G, Pegatoquet A, Miramond B, Gripon V. Quantization and deployment of deep neural networks on microcontrollers. Sensors. 2021;21(9): 9. https:\/\/doi.org\/10.3390\/s21092984.","journal-title":"Sensors"},{"issue":"1","key":"202_CR82","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10791-025-09502-8","volume":"28","author":"K Taneja","year":"2025","unstructured":"Taneja K, Vashishtha J, Ratnoo S. Fraud-BERT: transformer based context aware online recruitment fraud detection. Discov Comput. 2025;28(1):9. https:\/\/doi.org\/10.1007\/s10791-025-09502-8.","journal-title":"Discov Comput"},{"key":"202_CR83","doi-asserted-by":"publisher","unstructured":"I. Tabassum, V. Nunavath. A Hybrid Deep Learning Approach for Multi-Class Cyberbullying Classification Using Multi-Modal Social Media Data. 2024. https:\/\/doi.org\/10.3390\/app142412007.","DOI":"10.3390\/app142412007"},{"key":"202_CR84","doi-asserted-by":"publisher","DOI":"10.3390\/math9212799","volume":"9","author":"A Taha","year":"2021","unstructured":"Taha A. Intelligent ensemble learning approach for phishing website detection based on weighted soft voting. Mathematics. 2021;9: 21. https:\/\/doi.org\/10.3390\/math9212799.","journal-title":"Mathematics"},{"key":"202_CR85","volume":"1","author":"I Sumardi","year":"2024","unstructured":"Sumardi I, Firdaus D. phishing website detection using ensemble algorithm convolutional neural network and bidirectional LSTM. Ind Sciencetech J. 2024;1: 1.","journal-title":"Ind Sciencetech J"},{"issue":"4","key":"202_CR86","first-page":"173","volume":"6","author":"MA Faheem","year":"2022","unstructured":"Faheem MA, Kakolu S, Aslam M. The role of explainable AI in cybersecurity: improving analyst trust in automated threat assessment systems. Iconic Res Eng J. 2022;6(4):173\u201382.","journal-title":"Iconic Res Eng J"},{"issue":"1","key":"202_CR87","doi-asserted-by":"publisher","first-page":"132","DOI":"10.4817\/IJARSCT-23624","volume":"5","author":"G Agarwal","year":"2025","unstructured":"Agarwal G. Explainable AI (XAI) for cyber defense: enhancing transparency and trust in AI-drivensecurity solutions. Int J Adv Res Sci, Commun Technol. 2025;5(1):132\u20138. https:\/\/doi.org\/10.4817\/IJARSCT-23624.","journal-title":"Int J Adv Res Sci, Commun Technol"},{"key":"202_CR88","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.1602.04938","author":"MT Ribeiro","year":"2016","unstructured":"Ribeiro MT, Singh S, Guestrin C. \u201cWhy should i trust you?\u201d: Explaining the predictions of any classifier. arXiv. 2016. https:\/\/doi.org\/10.4855\/arXiv.1602.04938.","journal-title":"arXiv"},{"key":"202_CR89","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2405.18624","author":"A Gueriani","year":"2024","unstructured":"Gueriani A, Kheddar H, Mazari AC. Enhancing IoT security with CNN and LSTM-based intrusion detection systems. arXiv. 2024. https:\/\/doi.org\/10.4855\/arXiv.2405.18624.","journal-title":"arXiv"},{"key":"202_CR90","doi-asserted-by":"publisher","DOI":"10.3390\/s25030854","volume":"25","author":"N Kaur","year":"2025","unstructured":"Kaur N, Gupta L. Securing the 6G\u2013IoT environment: a framework for enhancing transparency in artificial intelligence decision-making through explainable artificial intelligence. Sensors. 2025;25: 3. https:\/\/doi.org\/10.3390\/s25030854.","journal-title":"Sensors"},{"key":"202_CR91","doi-asserted-by":"publisher","DOI":"10.3390\/app9081669","volume":"9","author":"S Lee","year":"2019","unstructured":"Lee S, Lee J. Compressed learning of deep neural networks for OpenCL-capable embedded systems. Appl Sci. 2019;9: 8. https:\/\/doi.org\/10.3390\/app9081669.","journal-title":"Appl Sci"},{"issue":"3","key":"202_CR92","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s10115-017-1027-3","volume":"52","author":"A Aleroud","year":"2017","unstructured":"Aleroud A, Karabatis G. Contextual information fusion for intrusion detection: a survey and taxonomy. Knowl Inf Syst. 2017;52(3):563\u2013619. https:\/\/doi.org\/10.1007\/s10115-017-1027-3.","journal-title":"Knowl Inf Syst"},{"key":"202_CR93","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.1412.6572","author":"IJ Goodfellow","year":"2015","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv. 2015. https:\/\/doi.org\/10.4855\/arXiv.1412.6572.","journal-title":"arXiv"},{"key":"202_CR94","doi-asserted-by":"publisher","unstructured":"R. Yazdani, O. van der\u00a0Toorn, A. Sperotto. A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 2020. p. 559\u2011564. https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00082.","DOI":"10.1109\/EuroSPW51379.2020.00082"},{"key":"202_CR95","doi-asserted-by":"publisher","first-page":"42949","DOI":"10.1109\/ACCESS.2022.3168681","volume":"10","author":"M S\u00e1nchez-Paniagua","year":"2022","unstructured":"S\u00e1nchez-Paniagua M, Fern\u00e1ndez EF, Alegre E, Al-Nabki W, Gonz\u00e1lez-Castro V. Phishing URL detection: a real-case scenario through login URLs. IEEE Access. 2022;10:42949\u201360. https:\/\/doi.org\/10.1109\/ACCESS.2022.3168681.","journal-title":"IEEE Access"},{"key":"202_CR96","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3218043","author":"B Sabir","year":"2022","unstructured":"Sabir B, Babar MA, Gaire R, Abuadbba A. Reliability and robustness analysis of machine learning based phishing URL detectors. IEEE Trans Depend Secure Comput. 2022. https:\/\/doi.org\/10.1109\/TDSC.2022.3218043.","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"202_CR97","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-319-66332-6_21","volume-title":"Research in attacks, intrusions, and defenses","author":"T Vissers","year":"2017","unstructured":"Vissers T, et al. Exploring the ecosystem of malicious domain registrations in the TLD. In: Dacier M, Bailey M, Polychronakis M, editors., et al., Research in attacks, intrusions, and defenses. Cham: Springer International Publishing; 2017. p. 472\u201393. https:\/\/doi.org\/10.1007\/978-3-319-66332-6_21."},{"issue":"2","key":"202_CR98","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/COMST.2024.3441752","volume":"27","author":"A Kulkarni","year":"2025","unstructured":"Kulkarni A, Balachandran V, Das T. Phishing webpage detection: unveiling the threat landscape and investigating detection techniques. IEEE Commun Surv Tutor. 2025;27(2):974\u20131007. https:\/\/doi.org\/10.1109\/COMST.2024.3441752.","journal-title":"IEEE Commun Surv Tutor"},{"key":"202_CR99","doi-asserted-by":"publisher","unstructured":"I. Fette, N. Sadeh, A. Tomasic. Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web, in WWW \u201907. New York, NY, USA: Association for Computing Machinery. 2007, p. 649\u2011656. https:\/\/doi.org\/10.1145\/1242572.1242660.","DOI":"10.1145\/1242572.1242660"},{"key":"202_CR100","doi-asserted-by":"publisher","DOI":"10.1305\/jcsm2245-1439.1026","author":"Y Sakurai","year":"2021","unstructured":"Sakurai Y, Watanabe T, Okuda T, Akiyama M, Mori T. Identifying the phishing websites using the patterns of TLS certificates. J Cyber Secur Mobility. 2021. https:\/\/doi.org\/10.1305\/jcsm2245-1439.1026.","journal-title":"J Cyber Secur Mobility"},{"key":"202_CR101","doi-asserted-by":"publisher","unstructured":"P. Peng, L. Yang, L. Song, G. Wang. Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. In: Proceedings of the Internet Measurement Conference, in IMC \u201919. New York, NY, USA: Association for Computing Machinery. 2019. p. 478\u2011485. https:\/\/doi.org\/10.1145\/3355369.3355585.","DOI":"10.1145\/3355369.3355585"},{"key":"202_CR102","doi-asserted-by":"publisher","DOI":"10.4855\/arXiv.2205.13155","author":"E Choo","year":"2022","unstructured":"Choo E, Nabeel M, Silva RD, Yu T, Khalil I. A large scale study and classification of virustotal reports on phishing and malware URLs. arXiv. 2022. https:\/\/doi.org\/10.4855\/arXiv.2205.13155.","journal-title":"arXiv"},{"key":"202_CR103","doi-asserted-by":"publisher","unstructured":"Y. Zhang, J. I. Hong, L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th international conference on World Wide Web, in WWW \u201907. New York, NY, USA: Association for Computing Machinery. 2007. p. 639\u2011648. https:\/\/doi.org\/10.1145\/1242572.1242659.","DOI":"10.1145\/1242572.1242659"},{"key":"202_CR104","doi-asserted-by":"publisher","unstructured":"S. Aggarwal, V. Kumar, S. D. Sudarsan. Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. In: Proceedings of the 7th International Conference on Security of Information and Networks, in SIN \u201914. New York, NY, USA: Association for Computing Machinery. 2014. p. 217\u2011222. https:\/\/doi.org\/10.1145\/2659651.2659691.","DOI":"10.1145\/2659651.2659691"},{"key":"202_CR105","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1007\/978-3-642-33167-1_47","volume-title":"Computer security \u2013 ESORICS 2012","author":"R Verma","year":"2012","unstructured":"Verma R, Shashidhar N, Hossain N. Detecting phishing emails the natural language way. In: Foresti S, Yung M, Martinelli F, editors. Computer security \u2013 ESORICS 2012. Berlin: Springer; 2012. p. 824\u201341. https:\/\/doi.org\/10.1007\/978-3-642-33167-1_47."},{"key":"202_CR106","doi-asserted-by":"publisher","unstructured":"J. Yearwood, M. Mammadov, A. Banerjee. Profiling Phishing Emails Based on Hyperlink Information. pr\u00e9sent\u00e9 \u00e0 2010 International Conference on Advances in Social Networks Analysis and Mining, IEEE Computer Society. 2010. p. 120\u2011127. https:\/\/doi.org\/10.1109\/ASONAM.2010.56.","DOI":"10.1109\/ASONAM.2010.56"},{"key":"202_CR107","unstructured":"J. Chen, V. Paxson, J. Jiang. Composition kills: a case study of email sender authentication. In: Proceedings of the 29th USENIX Conference on Security Symposium, in SEC\u201920. USA: USENIX Association. 2020. p. 2183\u20112199."},{"key":"202_CR108","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.cose.2012.12.002","volume":"34","author":"V Ramanathan","year":"2013","unstructured":"Ramanathan V, Wechsler H. Phishing detection and impersonated entity discovery using conditional random field and latent Dirichlet allocation. Comput Secur. 2013;34:123\u201339. https:\/\/doi.org\/10.1016\/j.cose.2012.12.002.","journal-title":"Comput Secur"},{"issue":"8","key":"202_CR109","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/j.cose.2009.05.002","volume":"28","author":"A Herzberg","year":"2009","unstructured":"Herzberg A. DNS-based email sender authentication mechanisms: a critical review. Comput Secur. 2009;28(8):731\u201342. https:\/\/doi.org\/10.1016\/j.cose.2009.05.002.","journal-title":"Comput Secur"},{"key":"202_CR110","doi-asserted-by":"publisher","first-page":"104097","DOI":"10.1016\/j.cose.2024.104097","volume":"148","author":"P Sun","year":"2025","unstructured":"Sun P, Wan Y, Wu Z, Fang Z, Li Q. A survey on privacy and security issues in IoT-based environments: technologies, protection measures and future directions. Comput Secur. 2025;148:104097. https:\/\/doi.org\/10.1016\/j.cose.2024.104097.","journal-title":"Comput Secur"},{"issue":"6","key":"202_CR111","doi-asserted-by":"publisher","first-page":"e3935","DOI":"10.1002\/ett.3935","volume":"33","author":"S Deep","year":"2022","unstructured":"Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A, Bashir AK. A survey of security and privacy issues in the Internet of Things from the layered context. Trans Emerg Telecommun Technol. 2022;33(6):e3935. https:\/\/doi.org\/10.1002\/ett.3935.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"202_CR112","doi-asserted-by":"publisher","first-page":"58322","DOI":"10.1109\/ACCESS.2020.2982411","volume":"8","author":"F Wang","year":"2020","unstructured":"Wang F, Zhang M, Wang X, Ma X, Liu J. Deep learning for edge computing applications: a state-of-the-art survey. IEEE Access. 2020;8:58322\u201336. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982411.","journal-title":"IEEE Access"},{"issue":"4","key":"202_CR113","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MIS.2020.2988604","volume":"35","author":"Y Chen","year":"2020","unstructured":"Chen Y, Qin X, Wang J, Yu C, Gao W. FedHealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst. 2020;35(4):83\u201393. https:\/\/doi.org\/10.1109\/MIS.2020.2988604.","journal-title":"IEEE Intell Syst"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00202-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T11:27:32Z","timestamp":1759231652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00202-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":113,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["202"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00202-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"28 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"102"}}