{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T18:40:18Z","timestamp":1769193618278,"version":"3.49.0"},"reference-count":57,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.engappai.2026.113722","type":"journal-article","created":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T07:31:28Z","timestamp":1767425488000},"page":"113722","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PB","title":["DeepURLGuard: A comprehensive bidirectional recurrent neural network for multiclass malicious uniform resource locator classification with advanced features and explainability"],"prefix":"10.1016","volume":"166","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2159-4114","authenticated-orcid":false,"given":"Akash","family":"Shah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2746-780X","authenticated-orcid":false,"given":"Sapna","family":"Varshney","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9382-0491","authenticated-orcid":false,"given":"Monica","family":"Mehrotra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"23","key":"10.1016\/j.engappai.2026.113722_bib1","doi-asserted-by":"crossref","first-page":"16995","DOI":"10.1007\/s00521-023-08592-z","article-title":"An intelligent identification and classification system for malicious uniform resource locators (URLs)","volume":"35","author":"Abu Al-Haija","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.engappai.2026.113722_bib2","series-title":"2021 2nd International Conference for Emerging Technology, INCET 2021","article-title":"Detecting malware, malicious URLs and virus using machine learning and signature matching","author":"Acharya","year":"2021"},{"key":"10.1016\/j.engappai.2026.113722_bib3","doi-asserted-by":"crossref","first-page":"3573","DOI":"10.3390\/electronics11213573","article-title":"Website defacement detection and monitoring methods: a review","volume":"11","author":"Albalawi","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2026.113722_bib4","doi-asserted-by":"crossref","first-page":"121395","DOI":"10.1109\/ACCESS.2022.3222307","article-title":"Detecting malicious URLs using machine learning techniques: review and research directions","volume":"10","author":"Aljabri","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.engappai.2026.113722_bib5","article-title":"An assessment of lexical, network, and content-based features for detecting malicious URLs using machine learning and deep learning models","volume":"2022","author":"Aljabri","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"issue":"3","key":"10.1016\/j.engappai.2026.113722_bib6","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/19393555.2023.2193350","article-title":"URL filtering using machine learning algorithms","volume":"33","author":"Aljahdalic","year":"2024","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"10.1016\/j.engappai.2026.113722_bib7","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2025.3545771","article-title":"BERT-PhishFinder: a robust model for accurate phishing URL detection with optimized DistilBERT","author":"Aljofey","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.engappai.2026.113722_bib8","series-title":"Detecting Malicious URL,\u201d 2020 International Conference on Computing and Information Technology","author":"Alkhudair","year":"2020"},{"issue":"12","key":"10.1016\/j.engappai.2026.113722_bib9","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1007\/s00500-018-3066-4","article-title":"Context-sensitive and keyword density-based supervised machine learning techniques for malicious webpage detection","volume":"23","author":"Altay","year":"2019","journal-title":"Soft Comput."},{"key":"10.1016\/j.engappai.2026.113722_bib10","first-page":"6679","article-title":"TabNet: attentive interpretable tabular learning","volume":"8A","author":"Ar\u0131k","year":"2019","journal-title":"35th AAAI Conf. Artif. Intell. AAAI 2021"},{"key":"10.1016\/j.engappai.2026.113722_bib11","doi-asserted-by":"crossref","first-page":"30","DOI":"10.3390\/electronics13010030","article-title":"PhishTransformer: a novel approach to detect phishing attacks using URL collection and transformer","volume":"13","author":"Asiri","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2026.113722_bib12","series-title":"3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2014"},{"key":"10.1016\/j.engappai.2026.113722_bib13","first-page":"768","article-title":"A review on malicious link detection techniques","volume":"1","author":"Chaudhary","year":"2023"},{"key":"10.1016\/j.engappai.2026.113722_bib14","article-title":"Smote","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res. Jun"},{"key":"10.1016\/j.engappai.2026.113722_bib15","series-title":"2021 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2021","article-title":"Malicious url detection using logistic regression","author":"Chiramdasu","year":"2021"},{"issue":"5","key":"10.1016\/j.engappai.2026.113722_bib16","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1007\/s11831-021-09694-4","article-title":"Particle swarm optimization algorithm and its applications: a systematic review","volume":"29","author":"Gad","year":"2022","journal-title":"Arch. Comput. Methods Eng."},{"key":"10.1016\/j.engappai.2026.113722_bib17","doi-asserted-by":"crossref","first-page":"3373","DOI":"10.3390\/s22093373","article-title":"Cyber threat intelligence-based malicious URL detection model using ensemble learning","volume":"22","author":"Ghaleb","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.113722_bib18","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.comcom.2021.04.023","article-title":"A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment","volume":"175","author":"Gupta","year":"2021","journal-title":"Comput. Commun."},{"issue":"6","key":"10.1016\/j.engappai.2026.113722_bib19","first-page":"5889","article-title":"Detection of malicious URLs based on word vector representation and ngram","volume":"35","author":"Hai","year":"2018","journal-title":"J. Intell. Fuzzy Syst."},{"key":"10.1016\/j.engappai.2026.113722_bib20","doi-asserted-by":"crossref","first-page":"44462","DOI":"10.1109\/ACCESS.2024.3381038","article-title":"Advancing fake news detection: hybrid deep learning with FastText and explainable AI","volume":"12","author":"Hashmi","year":"2024","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.engappai.2026.113722_bib21","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","article-title":"A machine learning based approach for phishing detection using hyperlinks information","volume":"10","author":"Jain","year":"2019","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"4","key":"10.1016\/j.engappai.2026.113722_bib22","doi-asserted-by":"crossref","first-page":"3227","DOI":"10.1007\/s11277-022-09707-w","article-title":"APuML: an efficient approach to detect Mobile phishing webpages using machine learning","volume":"125","author":"Jain","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.engappai.2026.113722_bib23","first-page":"1","article-title":"A comprehensive literature review on phishing URL detection using deep learning techniques","author":"Kritika","year":"2024","journal-title":"J. Cyber Security Technol."},{"key":"10.1016\/j.engappai.2026.113722_bib24","series-title":"Malicious URL Detection Using NLP, Machine Learning and FLASK,\u201d Proceedings of the 2021 IEEE International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems","author":"Lakshmanarao","year":"2021"},{"issue":"Nov","key":"10.1016\/j.engappai.2026.113722_bib25","article-title":"TransURL: improving malicious URL detection with multi-layer transformer encoding and multi-scale pyramid features","volume":"253","author":"Liu","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.engappai.2026.113722_bib26","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102638","article-title":"PMANet: malicious URL detection via post-trained language model guided multi-level feature attention network","volume":"113","author":"Liu","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.engappai.2026.113722_bib27","series-title":"International Conference on Network and System Security","first-page":"467","article-title":"Detecting malicious URLs using lexical analysis","author":"Mamun","year":"2016"},{"key":"10.1016\/j.engappai.2026.113722_bib28","series-title":"Proceedings - 2020 IEEE International Conference on Big Data, Big Data","first-page":"1813","article-title":"Towards fighting cybercrime: malicious URL attack type detection using multiclass classification","author":"Manyumwa","year":"2020"},{"key":"10.1016\/j.engappai.2026.113722_bib29","series-title":"2019 9th Latin-American Symposium on Dependable Computing, LADC 2019 - Proceedings","article-title":"A comprehensive evaluation of webpage content features for detecting malicious websites","author":"McGahagan","year":"2019"},{"key":"10.1016\/j.engappai.2026.113722_bib30","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118499","article-title":"Word embeddings for topic modeling: an application to the estimation of the economic policy uncertainty index","volume":"211","author":"Miranda-Belmonte","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"10.1016\/j.engappai.2026.113722_bib31","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1007\/s10207-023-00686-y","article-title":"Malicious website identification using design attribute learning","volume":"22","author":"Naim","year":"2023","journal-title":"Int. J. Inf. Secur."},{"issue":"2","key":"10.1016\/j.engappai.2026.113722_bib32","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1109\/TNSM.2022.3225217","article-title":"An adversarial attack analysis on malicious advertisement URL detection framework","volume":"20","author":"Nowroozi","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.engappai.2026.113722_bib33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121183","article-title":"Look before you leap: detecting phishing web pages by exploiting raw URL and HTML characteristics","volume":"236","author":"Opara","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2026.113722_bib34","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2022.12.027","article-title":"deepBF: malicious URL detection using learned bloom filter and evolutionary deep learning","volume":"200","author":"Patgiri","year":"2023","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.engappai.2026.113722_bib35","first-page":"141","article-title":"Feature-based malicious URL and attack type detection using multi-class classification","volume":"10","author":"Patil","year":"2018","journal-title":"ISC Int. J. Inform. Security"},{"key":"10.1016\/j.engappai.2026.113722_bib36","series-title":"2024 IEEE 3rd International Conference on AI in Cybersecurity, ICAIC 2024","article-title":"A holistic review on detection of malicious browser extensions and links using deep learning","author":"Rama Abirami","year":"2024"},{"key":"10.1016\/j.engappai.2026.113722_bib37","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3484578","article-title":"QuickCharNet: an efficient URL classification framework for enhanced search engine optimization","author":"Rastakhiz","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.113722_bib38","first-page":"1","article-title":"Detection of malicious URLs using machine learning","author":"Reyes-Dorta","year":"2024","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.engappai.2026.113722_bib39","article-title":"A machine learning driven threat intelligence system for malicious URL detection","author":"Rupa","year":"2021","journal-title":"ACM Int. Conf. Proc. Ser."},{"key":"10.1016\/j.engappai.2026.113722_bib40","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.matpr.2021.04.041","article-title":"Lexical features based malicious URL detection using machine learning techniques","volume":"47","author":"Saleem Raja","year":"2021","journal-title":"Mater. Today Proc."},{"key":"10.1016\/j.engappai.2026.113722_bib41","series-title":"2022 6th International Conference on Trends in Electronics and Informatics, ICOEI 2022 - Proceedings","first-page":"778","article-title":"Survey on malicious URL detection techniques","author":"Saleem Raja","year":"2022"},{"key":"10.1016\/j.engappai.2026.113722_bib42","doi-asserted-by":"crossref","first-page":"83425","DOI":"10.1109\/ACCESS.2020.2991403","article-title":"PhishHaven - an efficient real-time AI phishing URLs detection system","volume":"8","author":"Sameen","year":"2020","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.engappai.2026.113722_bib43","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1109\/78.650093","article-title":"Bidirectional recurrent neural networks","volume":"45","author":"Schuster","year":"1997","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"10.1016\/j.engappai.2026.113722_bib44","first-page":"145","article-title":"Deep belief network based detection and categorization of malicious URLs","volume":"27","author":"Selvaganapathy","year":"2018","journal-title":"Inform. Security J."},{"issue":"3","key":"10.1016\/j.engappai.2026.113722_bib45","doi-asserted-by":"crossref","first-page":"7917","DOI":"10.1002\/cpe.7917","article-title":"DeepMUI: a novel method to identify malicious users on online social network platforms","volume":"36","author":"Shah","year":"2024","journal-title":"Concurr. Comput."},{"key":"10.1016\/j.engappai.2026.113722_bib46","article-title":"Malicious short URLs detection technique","volume":"2023","author":"Stoleriu","year":"2023"},{"key":"10.1016\/j.engappai.2026.113722_bib47","doi-asserted-by":"crossref","first-page":"8499","DOI":"10.3390\/s23208499","article-title":"BERT-based approaches to identifying malicious URLs","volume":"23","author":"Su","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.113722_bib48","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2025.100810","article-title":"From past to present: a survey of malicious URL detection techniques, datasets and code repositories","volume":"58","author":"Tian","year":"2025","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.engappai.2026.113722_bib49","author":"Tian"},{"issue":"1","key":"10.1016\/j.engappai.2026.113722_bib50","article-title":"A hybrid deep learning technique for spoofing website URL detection in real-time applications","volume":"11","author":"Ujah-Ogbuagu","year":"2024","journal-title":"J. Electr. Syst. Inform. Technol."},{"key":"10.1016\/j.engappai.2026.113722_bib51","series-title":"IWSPA 2017 - Proceedings of the 3rd ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2017","first-page":"55","article-title":"What's in a URL: fast feature extraction and malicious URL detection","author":"Verma","year":"2017"},{"key":"10.1016\/j.engappai.2026.113722_bib52","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104443","article-title":"Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity","volume":"154","author":"Xu","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2026.113722_bib53","doi-asserted-by":"crossref","first-page":"13453","DOI":"10.1109\/ACCESS.2024.3357095","article-title":"Efficient classification of malicious URLs: M-BERT - a modified BERT variant for enhanced semantic understanding","volume":"12","author":"Yu","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.113722_bib54","doi-asserted-by":"crossref","first-page":"9464","DOI":"10.1109\/ACCESS.2021.3049625","article-title":"Malicious URL detection based on a parallel neural joint model","volume":"9","author":"Yuan","year":"2021","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.engappai.2026.113722_bib55","doi-asserted-by":"crossref","first-page":"17159","DOI":"10.1007\/s11227-024-06124-7","article-title":"A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link","volume":"80","author":"Zaimi","year":"2024","journal-title":"J. Supercomput."},{"key":"10.1016\/j.engappai.2026.113722_bib56","series-title":"8th International Conference on Learning Representations, ICLR 2020","article-title":"Why gradient clipping accelerates training: a theoretical justification for adaptivity","author":"Zhang","year":"2019"},{"key":"10.1016\/j.engappai.2026.113722_bib57","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/978-3-319-93554-6_36","article-title":"Classifying malicious urls using gated recurrent neural networks","volume":"773","author":"Zhao","year":"2019","journal-title":"Adv. Intell. Syst. Comput."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626000035?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626000035?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:18:17Z","timestamp":1769185097000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197626000035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":57,"alternative-id":["S0952197626000035"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.113722","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DeepURLGuard: A comprehensive bidirectional recurrent neural network for multiclass malicious uniform resource locator classification with advanced features and explainability","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.113722","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"113722"}}