{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:12:29Z","timestamp":1769757149858,"version":"3.49.0"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Government of the United Republic of Tanzania through the Coastal Regional Commissioner\u2019s Office"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3649636","type":"journal-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T18:38:53Z","timestamp":1767119933000},"page":"995-1013","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Hybrid Approach for Identification of Discriminative Features in Phishing Emails"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3879-5312","authenticated-orcid":false,"given":"Ramadhani K.","family":"Mbura","sequence":"first","affiliation":[{"name":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0246-8320","authenticated-orcid":false,"given":"Agrey","family":"Kato Benedicto","sequence":"additional","affiliation":[{"name":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8993-0332","authenticated-orcid":false,"given":"Ramadhani","family":"Sinde","sequence":"additional","affiliation":[{"name":"School of Computational and Communication Science and Engineering, The Nelson Mandela African Institution of Science and Technology, Arusha, Tanzania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3551764"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223111"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2018.8474040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0110945"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sciaf.2022.e01165"},{"key":"ref6","volume-title":"Phishing Activity Trends Report\u20131st Quarter 2023","year":"2023"},{"key":"ref7","volume-title":"Phishing Activity Trends Report\u20134th Quarter 2023","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/pr10071356"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app132413269"},{"key":"ref10","volume-title":"Phishing Activity Trends Report\u20131st Quarter 2025","year":"2025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.47342\/bmqk9457"},{"key":"ref12","article-title":"Phishing detection using machine learning techniques","author":"Shahrivari","year":"2020","journal-title":"arXiv:2009.11116"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-55174-1_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc.v11i8s.7182"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i6.1252"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3204260\/v1","article-title":"Evaluating supervised machine learning models for zero-day phishing attack detection: A comprehensive study","author":"Lotfi","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3196464"},{"key":"ref20","article-title":"Reconnoitering the class distinguishing abilities of the features, to know them better","author":"Sadhukhan","year":"2022","journal-title":"arXiv:2211.12771"},{"key":"ref21","article-title":"Enhancing phishing detection through feature importance analysis and explainable AI: A comparative study of CatBoost, XGBoost, and EBM models","author":"Fajar","year":"2024","journal-title":"arXiv:2411.06860"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.33093\/jiwe.2025.4.1.15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2025.2492923"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103561"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-11055-z"},{"issue":"2","key":"ref27","first-page":"279","article-title":"Classification of phishing email using word embedding and machine learning techniques","volume":"11","author":"Somesha","year":"2022","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060"},{"key":"ref29","article-title":"Beyond the hook: Advanced phishing techniques and AI-driven defenses","volume":"14","author":"Sandhya","year":"2025","journal-title":"i-Manager\u2019s J. Inf. Technol."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-85960-1_18"},{"key":"ref31","first-page":"3201","article-title":"Weak links in authentication chains: A large-scale analysis of email sender spoofing attacks","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Shen"},{"key":"ref32","article-title":"URL inspection tasks: Helping users detect phishing links in emails","author":"Lain","year":"2025","journal-title":"arXiv:2502.20234"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169923"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00768-x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103671"},{"key":"ref36","volume-title":"Global Phishing Statistics and Industry Trends (2023\u20132025)","year":"2025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/su151310612"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SEB4SDG60871.2024.10630203"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3287226"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100168"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.55810\/2313-0083.1091"},{"key":"ref42","volume-title":"19 Phishing Email Examples","year":"2024"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.33545\/2707661X.2024.v5.i2a.85"},{"key":"ref44","article-title":"Enhancing phishing detection: Integrating XGBoost with feature selection techniques","author":"Utami","year":"2025"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsm.2024.08.004"},{"issue":"3","key":"ref46","article-title":"Phishing URL detection using gradient boosting: A machine learning approach","volume":"9","author":"Babu","year":"2024","journal-title":"Int. J. Novel Res. Dev. (IJNRD)"},{"issue":"4","key":"ref47","article-title":"Exploring feature importance in phishing URL detection models","volume":"2","author":"Shaurya","year":"2023","journal-title":"NFSU J. Cyber Secur. Digit. Forensics"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.140613"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3704522.3704532"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON55910.2023.10293475"},{"key":"ref51","volume-title":"A Novel Phishing Detection Dataset","year":"2024"},{"key":"ref52","volume-title":"Web Page Phishing Detection Dataset","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/app142210086"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247135"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT65614.2025.11185656"},{"key":"ref56","article-title":"Python\u2019s indispensability in artificial intelligence and machine learning: A review","author":"Fatoba","year":"2024"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.5334\/dsj-2024-023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5505\/pajes.2021.62687"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IATMSI60426.2024.10502863"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069001"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC61858.2024.10714767"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.59324\/ejaset.2025.3(2).04"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3220780"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.057279"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/make6010018"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-84062-3_13"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.36347\/sjet.2025.v13i01.005"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-97713-8_13"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/s23073467"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.52783\/jes.3420"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3587716.3587790"},{"key":"ref72","article-title":"Text classification based machine learning model for spear phishing email detection","author":"Chabvutagondo","year":"2023"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104347"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04083-2_4"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3252366"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2025.100688"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89010-0_4"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCTech61146.2023.00044"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00103-8"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3390\/e24050687"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6004-8_5"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3162885"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3429445"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA63461.2024.10800945"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11318851.pdf?arnumber=11318851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:41:58Z","timestamp":1767678118000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3649636","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}