{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:52:34Z","timestamp":1776444754214,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,19]]},"DOI":"10.1145\/3704522.3704532","type":"proceedings-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:29:51Z","timestamp":1735907391000},"page":"137-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7098-5800","authenticated-orcid":false,"given":"Maraz","family":"Mia","sequence":"first","affiliation":[{"name":"Department of Computer Science, Tennessee Tech University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9004-5295","authenticated-orcid":false,"given":"Darius","family":"Derakhshan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tennessee Tech University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1260-1829","authenticated-orcid":false,"given":"Mir Mehedi Ahsan","family":"Pritom","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tennessee Tech University, Cookeville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004877"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Ali Aljofey Qingshan Jiang Qiang Qu Mingqing Huang and Jean-Pierre Niyigena. 2020. An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9 9 (2020) 1514.","DOI":"10.3390\/electronics9091514"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Ali Aljofey Qingshan Jiang Abdur Rasool Hui Chen Wenyin Liu Qiang Qu and Yang Wang. 2022. An effective detection approach for phishing websites using URL and HTML features. Scientific Reports 12 1 (2022) 8842.","DOI":"10.1038\/s41598-022-10841-5"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Habiba Bouijij and Amine Berqia. 2021. Machine Learning Algorithms Evaluation for Phishing URLs Classification. 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT) (2021) 01\u201305. https:\/\/api.semanticscholar.org\/CorpusID:245881138","DOI":"10.1109\/ISAECT53699.2021.9668489"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"N.\u00a0V. Chawla K.\u00a0W. Bowyer L.\u00a0O. Hall and W.\u00a0P. Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research 16 (June 2002) 321\u2013357. 10.1613\/jair.953","DOI":"10.1613\/jair.953"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Kang\u00a0Leng Chiew Ee\u00a0Hung Chang C\u00a0Lin Tan Johari Abdullah and Kelvin Sheng\u00a0Chek Yong. 2018. Building standard offline anti-phishing dataset for benchmarking. International Journal of Engineering & Technology 7 4.31 (2018) 7\u201314.","DOI":"10.14419\/ijet.v7i4.31.23333"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASSIC55218.2022.10088399"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Sumitra Das\u00a0Guptta Khandaker\u00a0Tayef Shahriar Hamed Alqahtani Dheyaaldin Alsalman and Iqbal\u00a0H Sarker. 2024. Modeling hybrid feature-based phishing websites detection using machine learning techniques. Annals of Data Science 11 1 (2024) 217\u2013242.","DOI":"10.1007\/s40745-022-00379-8"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Ayman El\u00a0Aassal Shahryar Baki Avisha Das and Rakesh\u00a0M Verma. 2020. An in-depth benchmarking and evaluation of phishing detection research for security needs. Ieee Access 8 (2020) 22170\u201322192.","DOI":"10.1109\/ACCESS.2020.2969780"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Muna Elsadig Ashraf\u00a0Osman Ibrahim Shakila Basheer Manal\u00a0Abdullah Alohali Sara Alshunaifi Haya Alqahtani Nihal Alharbi and Wamda Nagmeldin. 2022. Intelligent deep machine learning cyber phishing url detection based on bert features extraction. Electronics 11 22 (2022) 3647.","DOI":"10.3390\/electronics11223647"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395602"},{"key":"e_1_3_3_1_13_2","unstructured":"Cisco Talos\u00a0Intelligence Group. [n. d.]. PhishTank. https:\/\/phishtank.org\/. (Accessed on 1 September 2024)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Brij\u00a0B Gupta Krishna Yadav Imran Razzak Konstantinos Psannis Arcangelo Castiglione and Xiaojun Chang. 2021. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment. Computer Communications 175 (2021) 47\u201357.","DOI":"10.1016\/j.comcom.2021.04.023"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Maanak Gupta Charankumar Akiri Kshitiz Aryal Eli Parker and Lopamudra Praharaj. 2023. From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy. IEEE Access 11 (2023) 80218\u201380245. 10.1109\/ACCESS.2023.3300381","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Abdelhakim Hannousse and Salima Yahiouche. 2021. Towards benchmark datasets for machine learning based website phishing detection: An experimental study. Engineering Applications of Artificial Intelligence 104 (2021) 104347.","DOI":"10.1016\/j.engappai.2021.104347"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8536-9_44"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Abdul Karim Mobeen Shahroz Khabib Mustofa Samir Brahim\u00a0Belhaouari and S\u00a0Ramana\u00a0Kumar Joga. 2023. Phishing Detection System Through Hybrid Machine Learning Based on URL. IEEE Access PP (01 2023) 1\u20131. 10.1109\/ACCESS.2023.3252366","DOI":"10.1109\/ACCESS.2023.3252366"},{"key":"e_1_3_3_1_19_2","first-page":"4765","volume-title":"Advances in Neural Information Processing Systems 30","author":"Lundberg Scott\u00a0M","year":"2017","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems 30, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett (Eds.). Curran Associates, Inc., 4765\u20134774. http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf"},{"key":"e_1_3_3_1_20_2","unstructured":"Kelly Main. 2023. Phishing statistics by state in 2024. https:\/\/www.forbes.com\/advisor\/business\/phishing-statistics\/. (Accessed on 15 May 2024)."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00045"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0419-5_17"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Youness Mourtaji Mohammed Bouhorma Daniyal Alghazzawi Ghadah Aldabbagh and Abdullah Alghamdi. 2021. Hybrid rule-based solution for phishing URL detection using convolutional neural network. Wireless Communications and Mobile Computing 2021 (2021) 1\u201324.","DOI":"10.1155\/2021\/8241104"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Chidimma Opara Yingke Chen and Bo Wei. 2024. Look before You leap: Detecting phishing web pages by exploiting raw URL And HTML characteristics. Expert Systems with Applications 236 (2024) 121183.","DOI":"10.1016\/j.eswa.2023.121183"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT56998.2023.10307474"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280522"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947260"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Routhu\u00a0Srinivasa Rao Tatti Vaishnavi and Alwyn\u00a0Roshan Pais. 2020. CatchPhish: detection of phishing websites by inspecting URLs. Journal of Ambient Intelligence and Humanized Computing 11 (2020) 813\u2013825.","DOI":"10.1007\/s12652-019-01311-4"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00182"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON55910.2023.10293475"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Ozgur\u00a0Koray Sahingoz Ebubekir Buber Onder Demir and Banu Diri. 2019. Machine learning based phishing detection from URLs. Expert Systems with Applications 117 (2019) 345\u2013357.","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/iSemantic55962.2022.9920475"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS60797.2024.10527300"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00107"},{"key":"e_1_3_3_1_35_2","volume-title":"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices","author":"Thomson Graham","year":"2023","unstructured":"Graham Thomson. 2023. Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices. Technical Report. Albuquerque, NM, USA."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041016"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Grega Vrban\u010di\u010d Iztok Fister and Vili Podgorelec. 2020. Datasets for phishing websites detection. Data in Brief 33 (2020) 106438. 10.1016\/j.dib.2020.106438","DOI":"10.1016\/j.dib.2020.106438"},{"key":"e_1_3_3_1_38_2","unstructured":"Winson. 2024. Dataset for link phishing detection. https:\/\/www.kaggle.com\/datasets\/winson13\/dataset-for-link-phishing-detection. (Accessed on 15 May 2024)."},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435366"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CICT51604.2020.9311925"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Ammara Zamir Hikmat\u00a0Ullah Khan Tassawar Iqbal Nazish Yousaf Farah Aslam Almas Anjum and Maryam Hamdani. 2020. Phishing web site detection using diverse machine learning algorithms. The Electronic Library 38 1 (2020) 65\u201380.","DOI":"10.1108\/EL-05-2019-0118"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380313"}],"event":{"name":"NSysS '24: 11th International Conference on Networking, Systems, and Security","location":"Khulna Karak Bangladesh","acronym":"NSysS '24"},"container-title":["Proceedings of the 11th International Conference on Networking, Systems, and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704522.3704532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:16Z","timestamp":1750295896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":41,"alternative-id":["10.1145\/3704522.3704532","10.1145\/3704522"],"URL":"https:\/\/doi.org\/10.1145\/3704522.3704532","relation":{},"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"2025-01-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}