{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:11:19Z","timestamp":1774721479750,"version":"3.50.1"},"reference-count":15,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,14]]},"abstract":"<p>Phishing detection is a critical challenge in virtual realities, where malicious activities can compromise user security. This paper presents a novel approach integrating AI and Semantic Web Technologies for robust phishing detection. The proposed model preprocesses text data and leverages a reduced six-layer BERT encoder to extract contextual embeddings. Outputs from BERT, including classifier, attention, and encoder layers, are combined with features derived from Semantic Web Technologies and a custom deep learning layer to form a unified representation. The concatenated features are passed to a linear layer for classification. Experiments demonstrate superior performance, achieving 95\\% accuracy, 96\\% F1-score, and a 0.99 ROC-AUC, outperforming standard machine learning models. This framework provides a reliable phishing detection solution for virtual environments.<\/p>","DOI":"10.4018\/ijswis.371415","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T20:25:51Z","timestamp":1741983951000},"page":"1-19","source":"Crossref","is-referenced-by-count":7,"title":["Integrating AI and Semantic Web Technologies for Robust Phishing Detection in Virtual Realities"],"prefix":"10.4018","volume":"21","author":[{"given":"Liang","family":"Zhou","sequence":"first","affiliation":[{"name":"Jiading District Central Hospital, Shanghai University of Medicine and Health Sciences, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5796-9424","authenticated-orcid":true,"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[{"name":"Ronin Institute, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4505-7268","authenticated-orcid":true,"given":"Wadee Alhalabi","family":"Alhalabi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Immersive Virtual Reality Research Group, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7549-4429","authenticated-orcid":true,"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[{"name":"Hong Kong Metropolitan University, Hong Kong & Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7970-3248","authenticated-orcid":true,"given":"Eaman","family":"Alharbi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]}],"member":"2432","reference":[{"key":"IJSWIS.371415-0","doi-asserted-by":"publisher","DOI":"10.3390\/fi15080262"},{"key":"IJSWIS.371415-1","unstructured":"Al-Zubaidie, M., Zhang, Z., & Zhang, J. (2019). Efficient and secure ECDSA algorithm and its applications: A survey. arXiv Preprint arXiv:1902.10313."},{"key":"IJSWIS.371415-2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0287298"},{"key":"IJSWIS.371415-3","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297032"},{"key":"IJSWIS.371415-4","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v18i10.45725"},{"key":"IJSWIS.371415-5","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v18i10.45725"},{"key":"IJSWIS.371415-6","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.359767"},{"key":"IJSWIS.371415-7","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.019300"},{"key":"IJSWIS.371415-8","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-03-2012-0037"},{"key":"IJSWIS.371415-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118305"},{"key":"IJSWIS.371415-10","doi-asserted-by":"publisher","DOI":"10.1109\/MysuruCon52639.2021.9641614"},{"key":"IJSWIS.371415-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2009.07.012"},{"key":"IJSWIS.371415-12","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258030"},{"key":"IJSWIS.371415-13","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2020.1004899"},{"key":"IJSWIS.371415-14","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.361772"}],"container-title":["International Journal on Semantic Web and Information Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=371415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T22:06:48Z","timestamp":1765577208000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSWIS.371415"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2025,3,14]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijswis.371415","relation":{},"ISSN":["1552-6283","1552-6291"],"issn-type":[{"value":"1552-6283","type":"print"},{"value":"1552-6291","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,14]]}}}