{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:53:51Z","timestamp":1774929231216,"version":"3.50.1"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.130205","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:50:09Z","timestamp":1762271409000},"page":"130205","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"PD","title":["StealthPhisher: A defensive framework against phishing attack using hybrid deep learning and GenAI"],"prefix":"10.1016","volume":"299","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5803-0366","authenticated-orcid":false,"given":"Arvind","family":"Prasad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1762-0672","authenticated-orcid":false,"given":"Vibhu","family":"Yadav","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7353-4023","authenticated-orcid":false,"given":"Chirag","family":"Solanki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3565-8617","authenticated-orcid":false,"given":"Harshit","family":"Goswami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7545-1724","authenticated-orcid":false,"given":"Tanmay","family":"Jha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1690-193X","authenticated-orcid":false,"given":"Dushyant","family":"Nagal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.eswa.2025.130205_bib0001","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","article-title":"Principal component analysis","volume":"2","author":"Abdi","year":"2010","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"issue":"1","key":"10.1016\/j.eswa.2025.130205_bib0002","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s10207-024-00954-5","article-title":"How do gender and age similarities with a potential social engineer influence one\u2019s trust and willingness to take security risks?","volume":"24","author":"Abuelezz","year":"2025","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.eswa.2025.130205_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109407","article-title":"Phishnot: A cloud-based machine-learning approach to phishing url detection","volume":"218","author":"Alani","year":"2022","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2025.130205_bib0004","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.aej.2024.06.070","article-title":"Hybrid stacked autoencoder with dwarf mongoose optimization for phishing attack detection in internet of things environment","volume":"106","author":"Aljabri","year":"2024","journal-title":"Alexandria Engineering Journal"},{"key":"10.1016\/j.eswa.2025.130205_bib0005","doi-asserted-by":"crossref","DOI":"10.3389\/fcomp.2021.563060","article-title":"Phishing attacks: A recent comprehensive study and a new anatomy","volume":"3","author":"Alkhalil","year":"2021","journal-title":"Frontiers in Computer Science"},{"key":"10.1016\/j.eswa.2025.130205_bib0006","series-title":"Character-level word encoding deep learning model for combating cyber threats in phishing URL detection. Computers and Electrical Engineering","volume":"vol. 100","author":"Alshehri","year":"2022"},{"key":"10.1016\/j.eswa.2025.130205_bib0007","series-title":"Amazon Prime Day 2024: Cyber criminals Are Ready - Are You? Check Point Blog","author":"Anap","year":"2024"},{"issue":"4","key":"10.1016\/j.eswa.2025.130205_bib0008","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/45.329294","article-title":"Feed-forward neural networks","volume":"13","author":"Bebis","year":"1994","journal-title":"IEEE Potentials"},{"key":"10.1016\/j.eswa.2025.130205_bib0009","article-title":"Oecnet: Optimal feature selection-based email classification network using unsupervised learning with deep CNN model. e-prime-advances in electrical engineering","volume":"7","author":"Borra","year":"2024","journal-title":"Electronics and Energy"},{"key":"10.1016\/j.eswa.2025.130205_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103545","article-title":"Helphed: Hybrid ensemble learning phishing email detection","volume":"210","author":"Bountakas","year":"2023","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.eswa.2025.130205_bib0011","series-title":"Phish fighter: Self updating machine learning shield against phishing kits based on html code analysis","author":"Brezeanu","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0012","series-title":"Simulations of common unsupervised domain adaptation algorithms for image classification","author":"Chaddad","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0013","series-title":"Cascaded capsule twin attentional dilated convolutional network for malicious URL detection. Expert Systems with Applications","volume":"vol. 262","author":"Chauhan","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103780","article-title":"The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign","volume":"140","author":"Chrysanthou","year":"2024","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2025.130205_bib0015","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.aej.2024.11.054","article-title":"A probabilistic approach driven credit card anomaly detection with cblof and isolation forest models","volume":"114","author":"Chugh","year":"2025","journal-title":"Alexandria Engineering Journal"},{"key":"10.1016\/j.eswa.2025.130205_bib0016","unstructured":"Dinh, L., Krueger, D., & Bengio, Y. (2014). Nice: Non-linear independent components estimation. Technical Report arXiv preprint. 10.48550\/arXiv.1410.8516."},{"key":"10.1016\/j.eswa.2025.130205_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112540","article-title":"Detection of malicious urls using temporal convolutional network and multi-head self-attention mechanism","volume":"169","author":"Do","year":"2025","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.eswa.2025.130205_bib0018","series-title":"A novel framework for effective phishing URL detection using an LSTM-based siamese network. Knowledge-Based Systems","volume":"vol. 329","author":"K","year":"2025"},{"issue":"1","key":"10.1016\/j.eswa.2025.130205_bib0019","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s44196-024-00663-w","article-title":"A hybrid framework for improved weighted quantum particle swarm optimization and fast mask recurrent cnn to enhance phishing-url prediction performance","volume":"17","author":"Kumar","year":"2024","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"10.1016\/j.eswa.2025.130205_bib0020","series-title":"Twitter hackers who targeted elon musk and others received $121,000 in bitcoin, analysis shows","author":"Leswing","year":"2020"},{"key":"10.1016\/j.eswa.2025.130205_bib0021","article-title":"An introduction to Kolmogorov complexity and its applications","volume":"vol. 3","author":"Li","year":"2008"},{"issue":"1","key":"10.1016\/j.eswa.2025.130205_bib0022","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/18.61115","article-title":"Divergence measures based on the shannon entropy","volume":"37","author":"Lin","year":"1991","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.eswa.2025.130205_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.chbr.2024.100548","article-title":"Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks","volume":"17","author":"Madarie","year":"2025","journal-title":"Computers in Human Behavior Reports"},{"key":"10.1016\/j.eswa.2025.130205_bib0024","series-title":"Milcom 2021-2021 ieee military communications conference (milcom)","first-page":"197","article-title":"Urltran: Improving phishing url detection using transformers","author":"Maneriker","year":"2021"},{"issue":"1","key":"10.1016\/j.eswa.2025.130205_bib0025","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10586-024-04742-7","article-title":"Towards a reliable spam detection: An ensemble classification with rejection option","volume":"28","author":"Olivo","year":"2025","journal-title":"Cluster Computing"},{"key":"10.1016\/j.eswa.2025.130205_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.127044","article-title":"Evaluating spam filters and stylometric detection of ai-generated phishing emails","volume":"276","author":"Opara","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130205_bib0027","series-title":"Machine learning and knowledge discovery in databases: International workshops of ECML PKDD 2019","first-page":"453","article-title":"A wide and deep neural network for survival analysis from anatomical shape and tabular clinical data","author":"P\u00f6lsterl","year":"2019"},{"issue":"1","key":"10.1016\/j.eswa.2025.130205_bib0028","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-15631-3","article-title":"Optimizing iot intrusion detection with cosine similarity based dataset balancing and hybrid deep learning","volume":"15","author":"Prasad","year":"2025","journal-title":"Scientific Reports"},{"issue":"8","key":"10.1016\/j.eswa.2025.130205_bib0029","doi-asserted-by":"crossref","first-page":"9965","DOI":"10.1007\/s13369-021-06484-9","article-title":"VMFCVD: An optimized framework to combat volumetric ddos attacks using machine learning","volume":"47","author":"Prasad","year":"2022","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"3","key":"10.1016\/j.eswa.2025.130205_bib0030","doi-asserted-by":"crossref","first-page":"3313","DOI":"10.1007\/s13369-023-08016-z","article-title":"Botdefender: A collaborative defense framework against botnet attacks using network traffic analysis and machine learning","volume":"49","author":"Prasad","year":"2024","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10.1016\/j.eswa.2025.130205_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103545","article-title":"Phiusiil: A diverse security profile empowered phishing url detection framework based on similarity index and incremental learning","volume":"136","author":"Prasad","year":"2024","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2025.130205_bib0032","series-title":"Andromd: An android malware detection framework based on source code analysis and permission scanning","author":"Prasad","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0033","series-title":"Permguard: A scalable framework for android malware detection using permission-to-exploitation mapping","author":"Prasad","year":"2024"},{"key":"10.1016\/j.eswa.2025.130205_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104123","article-title":"PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and url extraction","volume":"148","author":"Prasad","year":"2025","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2025.130205_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.109910","article-title":"Artificial intelligence and machine learning in mechanical engineering: Current trends and future prospects","volume":"142","author":"Puttegowda","year":"2025","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"11","key":"10.1016\/j.eswa.2025.130205_bib0036","doi-asserted-by":"crossref","first-page":"340","DOI":"10.3390\/fi14110340","article-title":"Multimodel phishing url detection using LSTM, bidirectional LSTM, and GRU models","volume":"14","author":"Roy","year":"2022","journal-title":"Future Internet"},{"issue":"3","key":"10.1016\/j.eswa.2025.130205_bib0037","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/s12046-024-02538-4","article-title":"Deepephishnet: A deep learning framework for Email phishing detection using word embedding algorithms","volume":"49","author":"Somesha","year":"2024","journal-title":"S\u0101dhan\u0101"},{"key":"10.1016\/j.eswa.2025.130205_bib0038","series-title":"Hackers used modified Zoom installer and phishing campaign to deploy Trojan banker","author":"Stahie","year":"2023"},{"key":"10.1016\/j.eswa.2025.130205_bib0039","series-title":"EPAD: Ethereum phishing scam detection via graph contrastive learning. Expert Systems with Applications","author":"Sui","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0040","series-title":"ICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (icassp)","first-page":"2857","article-title":"Texception: A character\/word-level deep learning model for phishing url detection","author":"Tajaddodianfar","year":"2020"},{"key":"10.1016\/j.eswa.2025.130205_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124941","article-title":"BILSTM4DPS: An attention-based bilstm approach for detecting phishing scams in ethereum","volume":"256","author":"Tang","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130205_bib0042","series-title":"Exploring low-level statistical features of n-grams in phishing urls: A comparative analysis with high-level features","first-page":"1","author":"Tashtoush","year":"2024"},{"key":"10.1016\/j.eswa.2025.130205_bib0043","first-page":"3395","article-title":"Comparative analysis of machine learning algorithms for email phishing detection using TF-IDF, word2vec, and BERT","volume":"81","author":"Tawil","year":"2024","journal-title":"Comput. Mater. Contin"},{"key":"10.1016\/j.eswa.2025.130205_bib0044","series-title":"A novel multiagent collaborative learning architecture for automatic recognition of mudstone rock facies","author":"Tewari","year":"2024"},{"key":"10.1016\/j.eswa.2025.130205_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105670","article-title":"Repute: A soft voting ensemble learning framework for reputation-based attack detection in fog-iot milieu","volume":"118","author":"Verma","year":"2023","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.1016\/j.eswa.2025.130205_bib0046","series-title":"PDHG: An Ethereum phishing detection approach via heterogeneous graph transformer. Expert Systems with Applications","author":"Wang","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0047","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124120","article-title":"Phishing webpage detection based on global and local visual similarity","volume":"252","author":"Wang","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130205_bib0048","series-title":"Task-Driven Attention Attack: An Enhanced Adversarial Framework for Long Text. Expert Systems with Applications","author":"Xu","year":"2025"},{"key":"10.1016\/j.eswa.2025.130205_bib0049","series-title":"Securing the human hacking in information security. information and software technology","article-title":"Can serious gaming tactics bolster spear-phishing and phishing resilience?","author":"Yasin","year":"2024"},{"key":"10.1016\/j.eswa.2025.130205_bib0050","series-title":"A deep learning mechanism to detect phishing urls using the permutation importance method and smote-tomek link","first-page":"1","author":"Zaimi","year":"2024"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425038205?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425038205?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:46:27Z","timestamp":1766504787000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425038205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":50,"alternative-id":["S0957417425038205"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130205","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"StealthPhisher: A defensive framework against phishing attack using hybrid deep learning and GenAI","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130205","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"130205"}}