{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T05:15:01Z","timestamp":1741410901940,"version":"3.38.0"},"reference-count":54,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057211","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T08:20:46Z","timestamp":1732004446000},"page":"4049-4080","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks"],"prefix":"10.32604","volume":"81","author":[{"given":"Saad Awadh","family":"Alanazi","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-019-1507-y","article-title":"Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations","volume":"44","author":"Bhuyan","year":"2020","journal-title":"J. Med. Syst."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2023.113977","article-title":"Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions","volume":"171","author":"Bera","year":"2023","journal-title":"Decis. Support Syst."},{"key":"ref3","series-title":"2024 IEEE Int. Conf. Cyber Secur. Resil.","article-title":"Enhancing ATM security management in the post-quantum era with quantum key distribution","author":"Ahmad","year":"2024"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/computers12040079","article-title":"Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions","volume":"12","author":"Malik","year":"2023","journal-title":"Computers"},{"key":"ref5","first-page":"2723","article-title":"Machine learning empowered security management and quality of service provision in SDN-NFV environment","volume":"66","author":"Shahzadi","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref6","article-title":"XML-LightGBMDroid: A self-driven interactive mobile application utilizing explainable machine learning for breast cancer diagnosis","volume":"5","author":"Uddin","year":"2023","journal-title":"Eng. Rep."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s10115-022-01672-x","article-title":"Applications of deep learning for phishing detection: A systematic literature review","volume":"64","author":"Catal","year":"2022","journal-title":"Knowl. Inf. Syst."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3390\/s23084060","article-title":"Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure","volume":"23","author":"Riggs","year":"2023","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.6426","article-title":"Chatbots: Security, privacy, data protection, and social aspects","volume":"33","author":"Hasal","year":"2021","journal-title":"Concurr. Comput."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-319-78440-3_8","article-title":"Cybersecurity as an industry: A cyber threat intelligence perspective","author":"Samtani","year":"2020","journal-title":"Palgr. Handbook Int. Cybercrim. Cyberdevian."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1038\/s41586-023-05881-4","article-title":"Foundation models for generalist medical artificial intelligence","volume":"616","author":"Moor","year":"2023","journal-title":"Nature"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1136\/bmjhci-2019-100031","article-title":"Phishing in healthcare organisations: Threats, mitigation and approaches","volume":"26","author":"Priestman","year":"2019","journal-title":"BMJ Health Care Inform."},{"key":"ref13","article-title":"Human-machine teaming is key to AI adoption: Clinicians\u2019 experiences with a deployed machine learning system","volume":"5","author":"Henry","year":"2022","journal-title":"npj Dig. Med."},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/fi12100168","article-title":"Phishing attacks survey: Types, vectors, and technical approaches","volume":"12","author":"Alabdan","year":"2020","journal-title":"Future Internet"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"22051","DOI":"10.1109\/JIOT.2023.3296595","article-title":"Efficient privacy-preserving in IoMT with blockchain and lightweight secret sharing","volume":"10","author":"Li","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.apergo.2022.103908","article-title":"Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks","volume":"108","author":"Xu","year":"2023","journal-title":"Appl. Ergon."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1016\/j.procs.2023.12.045","article-title":"Healthcare 4.0: A review of phishing attacks in cyber security","volume":"230","author":"Sushma","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref18","article-title":"Phishing simulation exercise in a large hospital: A case study","volume":"8","author":"Rizzoni","year":"2022","journal-title":"Digit. Health"},{"key":"ref19","series-title":"Int. Conf. Adv. Comput. Data Sci.","first-page":"529","article-title":"Spear phishing using machine learning","author":"Hegde","year":"2023"},{"key":"ref20","series-title":"The Seventh Int. Conf. Data Anal.","first-page":"73","article-title":"Machine learning for cyber defense and attack","author":"Rege","year":"2018"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1587\/transinf.2018NTI0001","article-title":"Machine learning mechanisms for cyber-phishing attack","volume":"102","author":"Chen","year":"2019","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"363","DOI":"10.32604\/csse.2023.040721","article-title":"Security monitoring and management for the network services in the orchestration of SDN-NFV environment using machine learning techniques","volume":"48","author":"Alshammari","year":"2024","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-024-00237-5","article-title":"Phishing behavior detection on different blockchains via adversarial domain adaptation","volume":"7","author":"Yan","year":"2024","journal-title":"Cybersecurity"},{"key":"ref24","series-title":"2021 Int. Conf. Automat., Control Mech. Indus. 4.0 (ACMI)","first-page":"1","article-title":"The emergence threat of phishing attack and the detection techniques using machine learning models","author":"Ripa","year":"2021"},{"key":"ref25","series-title":"2021 IEEE 24th Int. Conf. Comput. Support. Cooperat. Work Des. (CSCWD)","first-page":"354","article-title":"Spear phishing emails detection based on machine learning","author":"Ding","year":"2021"},{"key":"ref26","series-title":"2019 Int. Conf. Computat. Sci. Comput. Intell. (CSCI)","first-page":"202","article-title":"Phishing attack detection: A solution based on the typical machine learning modeling cycle","author":"Espinoza","year":"2019"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"70977","DOI":"10.1109\/ACCESS.2023.3294090","article-title":"Machine-generated text: A comprehensive survey of threat models and detection methods","volume":"11","author":"Crothers","year":"2023","journal-title":"IEEE Access"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.dss.2018.01.001","article-title":"Detection of online phishing email using dynamic evolving neural network based on reinforcement learning","volume":"107","author":"Smadi","year":"2018","journal-title":"Decis. Support Syst."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.31577\/cai_2022_5_1337","article-title":"Character and word embeddings for phishing email detection","volume":"41","author":"Stevanovi\u0107","year":"2022","journal-title":"Comput. Inform."},{"key":"ref30","series-title":"2017 Comput. Conf.","first-page":"149","article-title":"Employing machine learning techniques for detection and classification of phishing emails","author":"Moradpoor","year":"2017"},{"key":"ref31","series-title":"Proc. 2015 IJCAI Workshop Behav., Econ. Computat. Intell. Secur.","first-page":"1","article-title":"An initial study on personalized filtering thresholds in defending sequential spear phishing attacks","author":"Zhao","year":"2015"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.3390\/s23094403","article-title":"A deep learning-based innovative technique for phishing detection in modern security with uniform resource locators","volume":"23","author":"Aldakheel","year":"2023","journal-title":"Sensors"},{"key":"ref33","series-title":"2020 3rd Int. Conf. Comput. App. Inf. Secur. (ICCAIS)","first-page":"1","article-title":"Mitigating email phishing attacks using convolutional neural networks","author":"Alotaibi","year":"2020"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.3390\/s24072077","article-title":"Advancing phishing email detection: A comparative study of deep learning models","volume":"24","author":"Altwaijry","year":"2024","journal-title":"Sensors"},{"key":"ref35","first-page":"203","author":"Samanta","year":"2022","journal-title":"Data Analytics, Computational Statistics, and Operations Research for Engineers: Methodologies and Applications"},{"key":"ref36","article-title":"InteliRank: A four-pronged agent for the intelligent ranking of cloud services based on end-users\u2019 feedback","volume":"22","author":"Din","year":"2022","journal-title":"Sensors"},{"key":"ref37","first-page":"1468","article-title":"Cognitively managed multi-level authentication for security using fuzzy logic based quantum key distribution","volume":"34","author":"Shabbir","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref38","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-030-02182-5_4","article-title":"Cybersecurity and the evolutions of healthcare: Challenges and threats behind its evolution","author":"Frumento","year":"2019","journal-title":"M_Health Current Future App."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3575797","article-title":"SoK: Human-centered phishing susceptibility","volume":"26","author":"Zhuo","year":"2023","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref40","unstructured":"C. Subhadeep, \u201cPhishing email detection,\u201d 2023. Accesed: Jul. 15, 2024. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/subhajournal\/phishingemails\/data"},{"key":"ref41","series-title":"2023 IEEE Int. Conf. Depend., Autonomic Secur. Comput., Int. Conf. Pervas. Intell. Comput., Int. Conf. Cloud Big Data Comput., Int. Conf. Cyber Sci. Technol. Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","first-page":"684","article-title":"Phishing detection using deep learning and machine learning algorithms: Comparative analysis","author":"Tesfom","year":"2023"},{"key":"ref42","series-title":"2023 Int. Conf. Adv. Comput., Commun. Inf. Technol. (ICAICCIT)","first-page":"76","article-title":"A logistic regression approach for detecting phishing websites","author":"Mittal","year":"2023"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12071642","article-title":"Analysis of the performance impact of fine-tuned machine learning model for phishing URL detection","volume":"12","author":"Abdul Samad","year":"2023","journal-title":"Electronics"},{"key":"ref44","first-page":"1434","article-title":"A comparative analysis of phishing website detection using XGBOOST algorithm","volume":"97","author":"Musa","year":"2019","journal-title":"J. Theoret. Appl. Informat. Technol."},{"key":"ref45","first-page":"73","article-title":"Detecting phishing websites using Decision Trees: A machine learning approach","volume":"7","author":"Fazal","year":"2023","journal-title":"Int. J. Electron. Crime Invest."},{"key":"ref46","series-title":"2022 6th Int. Conf. Inf. Computat. Sci. (ICICoS)","first-page":"84","article-title":"Comparative analysis of machine learning classifiers for phishing detection","author":"Razak","year":"2022"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.procs.2020.02.251","article-title":"Comparison of adaboost with multiboosting for phishing website detection","volume":"168","author":"Subasi","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref48","first-page":"215","article-title":"Detection and binary classification of spear-phishing emails in organizations using a hybrid machine learning approach","author":"Akinwale","year":"2022","journal-title":"Artificial Intelligence in Cyber Security: Impact and Implications. Advanced Sciences and Technologies for Security Applications"},{"key":"ref49","series-title":"2017 APWG Symp. Electron. Crime Res. (eCrime)","first-page":"1","article-title":"Classifying phishing URLs using recurrent neural networks","author":"Bahnsen","year":"2017"},{"key":"ref50","first-page":"1","article-title":"Deep learning with convolutional neural network and long short-term memory for phishing detection","author":"Adebowale","year":"2019","journal-title":"2019 13th Int. Conf. Softw., Knowl., Inform. Manag. Appl. (SKIMA)"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.3390\/fi14110340","article-title":"Multimodel phishing URL detection using LSTM, bidirectional LSTM, and GRU models","volume":"14","author":"Roy","year":"2022","journal-title":"Future Internet"},{"key":"ref52","first-page":"60","article-title":"Enhanc\u0435d analysis approach to detect phishing attacks during COVID-19 crisis","volume":"22","author":"Jafar","year":"2022","journal-title":"Cybern. Inf. Technol."},{"key":"ref53","series-title":"2021 IEEE Int. Conf. Big Data (Big Data)","first-page":"5609","article-title":"Convolutional neural network optimization for phishing email classification","author":"McGinley","year":"2021"},{"key":"ref54","series-title":"2019 Int. Conf. Comput., Commun., Chem., Mater. Electron. Eng. (IC4ME2)","first-page":"1","article-title":"Automated prediction of phishing websites using deep convolutional neural network","author":"Hasan","year":"2019"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59041\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:06:45Z","timestamp":1741327605000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":54,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057211","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}