{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T18:27:58Z","timestamp":1777141678008,"version":"3.51.4"},"reference-count":34,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057138","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:28:32Z","timestamp":1733970512000},"page":"4853-4874","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":8,"title":["A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks"],"prefix":"10.32604","volume":"81","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Razaz Waheeb","family":"Attar","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Shavi","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Alhomoud","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","article-title":"Phishing attacks survey: Types, vectors, and technical approaches","volume":"12","author":"Alabdan","year":"2020","journal-title":"Fut. Inter."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103901","article-title":"Hybrid optimization enabled squeeze net for phishing attack detection","volume":"144","author":"Kamble","year":"2024","journal-title":"Comput. Securi."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"11117","DOI":"10.1002\/int.23035","article-title":"A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems","volume":"37","author":"Jain","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref4","unstructured":"A. Katiyar, \u201cSocial engineering phishing detection,\u201d 2023. Accessed: Sep. 30, 2024. [Online]. Available: https:\/\/insights2techinfo.com\/social-engineering-phishing-detection\/"},{"key":"ref5","unstructured":"Statista, \u201cTop phishing statistics for 2024: Latest figures and trends,\u201d 2024. Accessed: Jun. 30, 2024. [Online]. Available: https:\/\/www.statista.com\/statistics\/266155\/number-of-phishing-domain-names-worldwide\/"},{"key":"ref6","unstructured":"G. Smith, \u201cNumber of unique phishing sites detected worldwide from 3rd quarter 2013 to 1st quarter 2024,\u201d 2024. Accessed: Jun. 30, 2024. [Online]. Available: https:\/\/www.stationx.net\/phishing-statistics\/"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11071090","article-title":"Optimized URL feature selection based on genetic-algorithm-embedded deep learning for phishing website detection","volume":"11","author":"Bu","year":"2022","journal-title":"Electronics"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109407","article-title":"PhishNot: A cloud-based machine-learning approach to phishing URL detection","volume":"218","author":"Alani","year":"2022","journal-title":"Comput. Netw."},{"key":"ref9","article-title":"Mutual information based logistic regression for phishing URL detection","volume":"2","author":"Vajrobol","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"ref10","unstructured":"S. N. Kee, \u201cThe impact of phishing on cloud-based systems and blockchain-based mitigations,\u201d 2024. Accessed: Sep. 30, 2024. [Online]. Available: https:\/\/insights2techinfo.com\/the-impact-of-phishing-on-cloud-based-systems-and-blockchain-based-mitigations\/"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1049\/ise2.12106","article-title":"An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders","volume":"17","author":"Prabakaran","year":"2023","journal-title":"IET Inform. Secur."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"121395","DOI":"10.1109\/ACCESS.2022.3222307","article-title":"Detecting malicious URLs using machine learning techniques: Review and research directions","volume":"10","author":"Aljabri","year":"2022","journal-title":"IEEE Access"},{"key":"ref13","first-page":"4895","article-title":"Optimized phishing detection with recurrent neural network and whale optimizer algorithm","volume":"80","author":"Gupta","year":"2024","journal-title":"Comput. Mat. Contin."},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10121492","article-title":"Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection","volume":"10","author":"Bu","year":"2021","journal-title":"Electronics"},{"key":"ref15","article-title":"Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?","volume":"5","author":"Almousa","year":"2022","journal-title":"Secur. Priv."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110707","article-title":"TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features","volume":"253","author":"Liu","year":"2024","journal-title":"Comput. Netw."},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102638","article-title":"PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network","volume":"113","author":"Liu","year":"2025","journal-title":"Inf. Fusion"},{"key":"ref18","first-page":"30","article-title":"Feature selection to enhance phishing website detection based on URL using machine learning techniques","volume":"4","author":"Rani","year":"2023","journal-title":"J. Soft Comput. Data Min."},{"key":"ref19","first-page":"3129","article-title":"SI\u2013BBA\u2013A novel phishing website detection based on Swarm intelligence with deep learning","volume":"80","author":"Kumar","year":"2021","journal-title":"Mater. Today: Proc."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3611392","article-title":"Single and hybrid-ensemble learning-based phishing website detection: Examining impacts of varied nature datasets and informative feature selection technique","volume":"4","author":"Adane","year":"2023","journal-title":"Digit. Thre.: Res. Pract."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","article-title":"Machine learning based phishing detection from URLs","volume":"117","author":"Sahingoz","year":"2019","journal-title":"Expert. Syst. Appl."},{"key":"ref22","series-title":"2020 Third Int. Conf. Smart Syst. Invent. Technol. (ICSSIT)","article-title":"Phishing attacks detection using deep learning approach","author":"Saha","year":"2020"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","article-title":"A machine learning based approach for phishing detection using hyperlinks information","volume":"10","author":"Jain","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"15196","DOI":"10.1109\/ACCESS.2019.2892066","article-title":"Phishing website detection based on multidimensional features driven by deep learning","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/8241104","article-title":"Hybrid rule-based solution for phishing URL detection using convolutional neural network","volume":"2021","author":"Mourtaji","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-030-57077-4_10","author":"Imambi","year":"2021","journal-title":"Programming with TensorFlow:\n\nSolution for Edge Computing Applications"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-1-4842-5364-9_2","article-title":"Introduction to PyTorch","author":"Ketkar","year":"2021","journal-title":"Deep Learning with Python. Berkeley"},{"key":"ref28","article-title":"pandas-dev\/pandas: Pandas 1.0. 5","author":"Reback","year":"2020","journal-title":"Zenodo"},{"key":"ref29","author":"Idris","year":"2015","journal-title":"NumPy: Beginner\u2019s Guide"},{"key":"ref30","author":"McKinney","year":"2012","journal-title":"Python for Data Analysis: Data Wrangling with Pandas, Numpy, and Ipython"},{"key":"ref31","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J.Mach. Learn. Res."},{"key":"ref32","first-page":"45","author":"Kramer","year":"2016","journal-title":"Machine Learning for Evolution Strategies"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102871","article-title":"MEALPY: An open-source library for latest meta-heuristic algorithms in Python","volume":"139","author":"Van Thieu","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref34","unstructured":"E. Chand, \u201cPhishing website detector,\u201d 2023. Accessed: Jan. 30, 2024 . [Online]. Available: https:\/\/www.kaggle.com\/datasets\/eswarchandt\/phishing-website-detector"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59040\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:06:29Z","timestamp":1741327589000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":34,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057138","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}