{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T18:27:57Z","timestamp":1777141677532,"version":"3.51.4"},"reference-count":33,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T00:00:00Z","timestamp":1721347200000},"content-version":"vor","delay-in-days":200,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.051778","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T09:09:09Z","timestamp":1720429749000},"page":"1325-1345","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":18,"title":["Phishing Attacks Detection Using Ensemble Machine Learning Algorithms"],"prefix":"10.32604","volume":"80","author":[{"given":"Nisreen","family":"Innab","sequence":"first","affiliation":[]},{"given":"Ahmed Abdelgader Fadol","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Mohammed Awad Mohammed","family":"Ataelfadiel","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Abu-Zanona","sequence":"additional","affiliation":[]},{"given":"Bassam Mohammad","family":"Elzaghmouri","sequence":"additional","affiliation":[]},{"given":"Farah H.","family":"Zawaideh","sequence":"additional","affiliation":[]},{"given":"Mouiad Fadeil","family":"Alawneh","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2320","DOI":"10.12928\/telkomnika.v18i5.15911","article-title":"An overview of Internet of Things","volume":"18","author":"Villamil","year":"2020","journal-title":"Telkomnika (Telecommunication Computing Electronics and Control)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"e4946","DOI":"10.1002\/cpe.4946","article-title":"An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols","volume":"32","author":"Gupta","year":"2020","journal-title":"Concurr. Comput."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","article-title":"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments","volume":"7","author":"Li","year":"2021","journal-title":"Energy Rep."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1108\/ICS-09-2022-0147","article-title":"Cyber terrorism cases and stock market valuation effects","volume":"31","author":"Smith","year":"2023","journal-title":"Inf. Comput. Secur."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s42979-021-00535-6","article-title":"Deep cybersecurity: A comprehensive overview from neural network and deep learning perspective","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101677","DOI":"10.1016\/j.cose.2019.101677","article-title":"Cybersecurity for industrial control systems: A survey","volume":"89","author":"Bhamare","year":"2020","journal-title":"Comput. Secur."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"tyab005","DOI":"10.1093\/cybsec\/tyab005","article-title":"Simulation for cybersecurity: State of the art and future directions","volume":"7","author":"Kavak","year":"2021","journal-title":"J. Cybersecur."},{"key":"ref8","first-page":"57","article-title":"Machine learning in cybersecurity: A comprehensive survey","volume":"19","author":"Dasgupta","year":"2022","journal-title":"The J. Def. Model. Simul."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.3390\/en13102509","article-title":"Performance comparison and current challenges of using machine learning techniques in cybersecurity","volume":"13","author":"Shaukat","year":"2020","journal-title":"Energies"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"100547","DOI":"10.1016\/j.ijcip.2022.100547","article-title":"Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects","volume":"38","author":"Berghout","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"5811","DOI":"10.3390\/app10175811","article-title":"A systematic review of defensive and offensive cybersecurity with machine learning","volume":"10","author":"Aiyanyo","year":"2020","journal-title":"Appl. Sci."},{"key":"ref12","series-title":"2021 12th Int. Conf. Inf. Commun. Syst. (ICICS)","first-page":"147","article-title":"URL phishing detection using machine learning techniques based on URLs lexical analysis","author":"Abutaha","year":"May 2021"},{"key":"ref13","series-title":"Proc. Anti-Phish. Work. Groups 2nd Annual eCrime Res. Summit","first-page":"60","article-title":"A comparison of machine learning techniques for phishing detection","author":"Abu-Nimeh","year":"Oct. 2007"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"262","DOI":"10.35925\/j.multi.2020.4.30","article-title":"Analyzing and predicting spear-phishing using machine learning methods","volume":"10","author":"Samad","year":"2020","journal-title":"Multidiszciplin\u00e1ris Tudom\u00e1nyok"},{"key":"ref15","first-page":"365","article-title":"Feature selection for email phishing detection using machine learning","volume":"2","author":"Yadav","journal-title":"Int. Conf. Innov. Comput. Commun.: Proc. ICICC 2021"},{"key":"ref16","article-title":"Machine learning methods for phishing attacks","volume":"1","author":"Medelbekov","year":"2023","journal-title":"J. Problems Comput. Sci. Inf. Technol."},{"key":"ref17","unstructured":"V. Shahrivari, M. M. Darabi, and M. Izadi, \u201cPhishing detection using machine learning techniques,\u201d arXiv preprint arXiv:2009.11116, 2020."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"119","DOI":"10.18576\/jsap\/130108","article-title":"Website phishing detection using machine learning techniques","volume":"13","author":"Alazaidah","year":"2024","journal-title":"J. Stat. Appl. Probab."},{"key":"ref19","series-title":"Int. Conf. Smart Technol. Comput., Electr. Electron. (ICSTCEE)","first-page":"391","article-title":"Phishing detection using random forest, SVM and neural network with backpropagation","author":"Sindhu","year":"2020"},{"key":"ref20","series-title":"Intell. Syst. Des. Appl.: 18th Int. Conf. Intell. Syst. Des. Appl. (ISDA 2018)","first-page":"120","article-title":"Identification of phishing attack in websites using random forest-SVM hybrid model","volume":"941","author":"Pandey","year":"2020"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"106505","DOI":"10.1016\/j.asoc.2020.106505","article-title":"DTOF-ANN: An artificial neural network phishing detection model based on decision tree and optimal features","volume":"95","author":"Zhu","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"ref22","first-page":"43","article-title":"Applying machine learning algorithms for detecting phishing websites: Applications of SVM, KNN, decision trees, and random forests","volume":"6","author":"Kayode-Ajala","year":"2022","journal-title":"Int. J. Inf. Cybersecur."},{"key":"ref23","first-page":"59","article-title":"PDMLP: Phishing detection using multilayer perceptron","volume":"12","author":"Al-Ahmadi","year":"2020","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"key":"ref24","first-page":"3353","article-title":"Efficient prediction of phishing websites using multilayer perceptron (MLP)","volume":"98","author":"Odeh","year":"2020","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref25","unstructured":"N. N. Naik, \u201cModelling enhanced phishing detection using XGBoost,\u201d Doctoral dissertation, National College of Ireland, Dublin, 2021."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"366","DOI":"10.3390\/a16080366","article-title":"Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study","volume":"16","author":"Joshi","year":"2023","journal-title":"Algorithms"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"e7287","DOI":"10.1002\/cpe.7287","article-title":"An improved anti-phishing model utilizing TF-IDF and AdaBoost","volume":"34","author":"Sharma","year":"2022","journal-title":"Concurr. Comput."},{"key":"ref28","doi-asserted-by":"crossref","unstructured":"F. Nthurima, A. Mutua, and W. S. Titus, \u201cDetecting phishing emails using random forest and AdaBoost classifier model,\u201d 2023. doi: 10.32591\/coas.ojit.0602.03123n.","DOI":"10.32591\/coas.ojit.0602.03123n"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.procs.2023.12.067","article-title":"Phishing detection using gradient boosting classifier","volume":"230","author":"Omari","year":"2023","journal-title":"Proc. Comput. Sci."},{"key":"ref30","first-page":"9808","article-title":"Performance evaluation in machine learning: The good, the bad, the ugly, and the way forward","volume":"33","author":"Flach","year":"Jul. 2019","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref31","series-title":"First Int. Conf. Sustainable Technol. Comput. Intell.: Proc. ICTSCI 2019","first-page":"705","article-title":"MinMaxScaler binary PSO for feature selection","author":"Shaheen","year":"2020"},{"key":"ref32","series-title":"2019 4th Int. Conf. Comput. Sci. Eng. (UBMK)","first-page":"1","article-title":"A weighted majority voting ensemble approach for classification","author":"Dogan","year":"Sep. 2019"},{"key":"ref33","series-title":"2nd Int. Conf. Data, Eng. Appli. (IDEA)","first-page":"1","article-title":"Ensemble learning techniques and its efficiency in machine learning: A survey","author":"Rincy","year":"Feb. 2020"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-80-1\/TSP_CMC_51778\/TSP_CMC_51778.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T11:37:57Z","timestamp":1741261077000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v80n1\/57399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.051778","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-03-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}