{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:56:34Z","timestamp":1773467794945,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tr.2026.3668659","type":"journal-article","created":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T20:48:51Z","timestamp":1772225331000},"page":"1145-1159","source":"Crossref","is-referenced-by-count":0,"title":["URL2Path: A Robust Graph Learning Approach for Malicious URL Detection"],"prefix":"10.1109","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6613-0954","authenticated-orcid":false,"given":"Mahdi","family":"Rabbani","sequence":"first","affiliation":[{"name":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0561-8590","authenticated-orcid":false,"given":"Morteza","family":"Eskandarian","sequence":"additional","affiliation":[{"name":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"}]},{"given":"Mansur","family":"Mirani","sequence":"additional","affiliation":[{"name":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"}]},{"given":"Gunjan","family":"Piya","sequence":"additional","affiliation":[{"name":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"}]},{"given":"Igor","family":"Opushnyev","sequence":"additional","affiliation":[{"name":"Mastercard Vancouver Tech Hub, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5720-0941","authenticated-orcid":false,"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computing, Queen&#x2019;s University, Kingston, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5582-0255","authenticated-orcid":false,"given":"Sajjad","family":"Dadkhah","sequence":"additional","affiliation":[{"name":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Internet crime report 2023","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825018"},{"key":"ref3","article-title":"Urlnet: Learning a URL representation with deep learning for malicious URL detection","author":"Le","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060969"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM62983.2024.10814617"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COINS51742.2021.9524269"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102964"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103288"},{"key":"ref10","article-title":"URLBERT: A contrastive and adversarial pre-trained model for URL classification","author":"Li","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-10010-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100810"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3545771"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102638"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112332"},{"key":"ref16","article-title":"Chakraborty phishing dataset","author":"Chakraborty","year":"2025"},{"key":"ref17","article-title":"phishing_pot: A collection of phishing samples for researchers and detection developers","author":"Peixoto","year":"2025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103545"},{"key":"ref19","article-title":"Open pagerank initiative","year":"2025"},{"key":"ref20","article-title":"Phishtank: Join the fight against phishing","year":"2025"},{"key":"ref21","article-title":"Openphish: Phishing intelligence","year":"2025"},{"key":"ref22","article-title":"Malwareworld: Threat intelligence aggregator","year":"2025"},{"key":"ref23","article-title":"Cambridge cybercrime centre","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v14.i1.pp358-367"},{"key":"ref25","article-title":"Spear phishing: Top threats and trends","author":"Networks","year":"2024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3986"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref29","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref30","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inform. Process. Syst.","volume":"30","author":"Hamilton","year":"2017"},{"issue":"20","key":"ref31","first-page":"10","article-title":"Graph attention networks","volume":"1050","author":"Velickovic","year":"2017","journal-title":"Statistics"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098061"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref43","first-page":"874","article-title":"Well-read students learn better: On the importance of pre-training compact models","volume-title":"Proc. 57th Annu. Meet. Assoc. Comput. Linguist.","author":"Turc","year":"2019"},{"key":"ref44","article-title":"Debertav3: Improving deberta using electra-style pre-training with gradient-disentangled embedding sharing","author":"He","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.acl-long.127"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-025-09422-z"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653028"},{"key":"ref48","article-title":"Roberta: A robustly optimized bert pretraining approach","author":"Liu","year":"2019"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11317936\/11417329.pdf?arnumber=11417329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:03:14Z","timestamp":1773464594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11417329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tr.2026.3668659","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}