{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T17:32:06Z","timestamp":1779384726803,"version":"3.53.1"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3412331","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:38:04Z","timestamp":1718131084000},"page":"85001-85026","source":"Crossref","is-referenced-by-count":37,"title":["Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1365-0104","authenticated-orcid":false,"given":"Ahmad Sahban","family":"Rafsanjani","sequence":"first","affiliation":[{"name":"School of Engineering and Technology, Sunway University, Bandar Sunway, Selangor Darul Ehsan, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2843-8605","authenticated-orcid":false,"given":"Norshaliza","family":"Binti Kamaruddin","sequence":"additional","affiliation":[{"name":"Faculty of Artificial Intelligence, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-057X","authenticated-orcid":false,"given":"Mehran","family":"Behjati","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, Sunway University, Bandar Sunway, Selangor Darul Ehsan, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3890-1245","authenticated-orcid":false,"given":"Saad","family":"Aslam","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, Sunway University, Bandar Sunway, Selangor Darul Ehsan, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7418-5317","authenticated-orcid":false,"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, Sunway University, Bandar Sunway, Selangor Darul Ehsan, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2838-8679","authenticated-orcid":false,"given":"Angela","family":"Amphawan","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, Sunway University, Bandar Sunway, Selangor Darul Ehsan, Malaysia"}],"role":[{"vocabulary":"crossref","role":"author"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107868"},{"key":"ref3","volume-title":"Making the World\u2019s Information Safely Accessible","year":"2022"},{"issue":"2","key":"ref4","first-page":"141","article-title":"Feature-based malicious URL and attack type detection using multi-class classification","volume":"10","author":"Patil","year":"2018","journal-title":"Int. J. Inf. Secur."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5101-1.ch008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9155-2_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110119"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3121388"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031269"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-013-0250-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s22093373"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3222307"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291811"},{"issue":"2","key":"ref15","first-page":"197","article-title":"A evaluating security and privacy features of quick response code scanners: A comparative study","volume":"10","author":"Rafsanjani","year":"2022","journal-title":"Open Int. J. Informat."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4917016"},{"key":"ref17","article-title":"URLNet: Learning a URL representation with deep learning for malicious URL detection","author":"Le","year":"2018","journal-title":"arXiv:1802.03162"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.118"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN53446.2022.9687204"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.46"},{"key":"ref23","article-title":"Malicious URL detection using machine learning: A survey","author":"Sahoo","year":"2017","journal-title":"arXiv:1701.07179"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2595794"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280549"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101613"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.07.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.01.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102967"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101494"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027485"},{"issue":"4","key":"ref33","first-page":"1","article-title":"Malicious URL detection system using combined SYM and logistic regression model","volume":"11","author":"Naresh","year":"2020","journal-title":"Int. J. Adv. Res. Eng. Technol."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCTT51595.2020.00060"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3116201"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418480"},{"key":"ref37","first-page":"1147","article-title":"Malicious URL detection: A comparative study","volume-title":"Proc. Int. Conf. Artif. Intell. Smart Syst. (ICAIS)","author":"Janet"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352828"},{"key":"ref39","article-title":"EXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys","author":"Saxe","year":"2017","journal-title":"arXiv:1702.08568"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121492"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.02.013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3301326.3301336"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895751"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT52419.2022.9711614"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102662"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09587-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/mso2018\/20499"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9031-3_3"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435366"},{"key":"ref52","article-title":"Malicious URL detection by combining machine learning and deep learning models","volume-title":"Emerging Trends in Artificial Intelligence for Internet of Things","volume":"1","author":"Rakotoasimbahoaka"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT52182.2021.9587682"},{"key":"ref54","volume-title":"Free Online Tools for Looking Up Potentially Malicious Websites","author":"Zeltser","year":"2021"},{"key":"ref55","volume-title":"PhishTank","author":"Ulevitch"},{"key":"ref56","volume-title":"PhishTank","author":"Ulevitch","year":"2023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237040"},{"key":"ref59","article-title":"Using lexical features for malicious URL detection\u2014A machine learning approach","author":"Joshi","year":"2019","journal-title":"arXiv:1910.06277"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8992930"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237040"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091514"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.105"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996831"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2012.258"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014140"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05366-6_31"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.10211"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00027"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.071"},{"key":"ref72","first-page":"778","article-title":"Survey on malicious URL detection techniques","volume-title":"Proc. 6th Int. Conf. Trends Electron. Informat. (ICOEI)","author":"Madhubala"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.004"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.006"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3426470"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2018.8659374"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/e23020182"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.23919\/APCC.2017.8303992"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/LADC48089.2019.8995713"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2020.0026"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00575-7"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8241104"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488463"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963161"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1456577"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991403"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096869"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239536"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470029"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8289-9_45"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC52777.2021.9580433"},{"issue":"7","key":"ref92","first-page":"68","article-title":"A novel framework for malicious URL detection using hybrid model","volume":"12","author":"Prasad","year":"2021","journal-title":"Turkish J. Comput. Math. Educ. (TURCOMAT)"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093094"},{"key":"ref94","article-title":"Deep reinforcement learning for detecting malicious websites","author":"Chatterjee","year":"2019","journal-title":"arXiv:1905.09207"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00107"},{"issue":"4S2","key":"ref96","first-page":"389","article-title":"Detection of malicious URLs using machine learning techniques","volume":"8","author":"Naveen","year":"2019","journal-title":"Int. J. Innov. Technol. Exploring Eng."},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3433174.3433592"},{"key":"ref98","first-page":"1","article-title":"A large-scale study of mobile web app security","volume-title":"Proc. Mobile Secur. Technol. Workshop (MoST)","volume":"50","author":"Mutchler"},{"key":"ref99","volume-title":"WhoXy","year":"2023"},{"key":"ref100","volume-title":"OpenPageRank","year":"2023"},{"key":"ref101","volume-title":"Enhancing-Malicious-URL-Detection","author":"Rafsanjani","year":"2023"},{"key":"ref102","volume-title":"URLhaus","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10552700.pdf?arnumber=10552700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:39:55Z","timestamp":1719347995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10552700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":102,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3412331","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}