<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Explainable Artificial Intelligence with Chicken Swarm Optimization Based Web Phishing Detection and Classification on Cyber-Physical Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alanoud Subahi</string-name>
          <email>asubahi@kau.edu.sa</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Computing and Information Technology, Department of Information Technology, King Abdulaziz University</institution>
          ,
          <addr-line>Rabigh 25732</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>At present, phishing attacks have developed as the most noticeable social network attacks controlled by government, public internet users, and businesses. Phishing websites is a cyberattack that mainly targets online user to steal their confidential data including banking details and login credentials. The websites phishing arise identical to their equal legitimate websites for appealing wide range of Internet users. The attacker cheats the user by suggesting the covered webpage as reliable or legitimate to recover its significant data. Numerous solutions for phishing websites attack had been introduced like heuristics, whitelisting or blacklisting, and Machine Learning (ML) based models. This study focuses on the design of Chicken Swarm Optimization with Explainable Artificial Intelligence using Phishing Detection and Classification (CSOXAI-PDC) techniques on Cyber-Physical Systems. The projected CSOXAI-PDC method emphasizes the effectual classification and recognition of phishing based on CPS. To attain this, the developed CSOXAI-PDC technique first executes the data normalization method. Next, the classification of phishing recognition occurs utilizing deep Q network (DQN) classifier. For enhancing the classification performance of DQN classifier, the hyperparameter tuning method can be done using the chicken swarm optimization (CSO) algorithm. Eventually, the CSOXAI-PDC method incorporates the XAI method LIME for superior clarification and perception of the black-box procedure for accurate identification of intrusions. The experimental analysis of the CSOXAI-PDC method is executed against real dataset and the outcomes establish the improvement of the projected method over existing techniques.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Criminals engaging in Internet fraud are growing in number and professionality. Cyber-attacks
are different, cultured, and common. Internet fraud usually involves the confidential theft of
data from an individual or organization for blackmail intentions, generating important tasks for
cybersecurity authorities [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The latest study has effectively identified phishing attacks on the
internet. Phishing is the challenge to snip private data like passwords, credit card numbers, and
usernames (and, indirectly, money) by imitating a truthful object in electrical contact, normally
for dangerous tenacities [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Since the usage of bait to latch a victim is equivalent, these words
were coined as a fishing homophone [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Phishing is normally performed with direct messaging
or e-mail spoofing, and it repeatedly craves the public to provide private data on a wrong
webpage that look-alike the same as the genuine one [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Victims are regularly tempted through
communications that seem from banks, social media platforms, IT administrators, auction sites,
or online payment computers [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Numerous websites have established auxiliary machines to
applications like game maps, still, they must be visibly labeled as to who assembled them, and
customers should not apply similar passwords over the internet.
      </p>
      <p>
        Machine learning (ML) and modern Artificial Intelligence (AI) methods became well-active
in some human life applications, and various earlier investigators applied ML in safety domains
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Computer security attacks were categorized into three kinds: semantic attacks, physical
attacks, and synthetic attacks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Phishing is the major semantic attack type. This technique
can be learned to differentiate between harmful and benign activities by seeing a range of
indicators and attributes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. These are trained on various data sets that hold phishing and
legitimate incidents together. By robotically recognizing related features from rare data inputs,
deep learning (DL) models namely recurrent neural network (RNN) and Convolutional Neural
Networks (CNNs) accept its ability next step [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. CNNs are appropriate for examining the web
page's content, photographs, and other visual evidence linked to phishing challenges then they
are experts at developing hierarchical depictions from graphical inputs. Nevertheless, RNNs are
trained at modeling consecutive information that permits for identifying time-based trends and
user activities that can specify phishing work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>This study focuses on the design of Chicken Swarm Optimization with Explainable Artificial
Intelligence using Phishing Detection and Classification (CSOXAI-PDC) techniques on
CyberPhysical Systems. To attain this, the developed CSOXAI-PDC technique first executes data
normalization method. Next, the classification of phishing recognition occurs utilizing deep Q
network (DQN) classifier. For enhancing the classification performance of DQN classifier, the
hyperparameter tuning method can be done using the chicken swarm optimization (CSO)
algorithm. Eventually, the CSOXAI-PDC method incorporates the XAI method LIME for
superior clarification and perception of the black-box procedure for accurate identification of
intrusions. The experimental analysis of the CSOXAI-PDC method is executed against real
dataset and the outcomes establish the improvement of the projected method over recent
techniques.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Survey</title>
      <p>
        Alotaibi et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] propose an adaptive mongoose optimization algorithm with a DL based
ID (AMOA-DLID) technique in IoT helped UAV network. In the introduced AMOA-DLID
method, AMOA is first employed for the process of FS. The next sparse AE (SAE) method could
be used for intrusion identifications. At last, the SAE method recognition rate could be enhanced
by using the Harris Hawks optimization (HHO) method. Ramachandran et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
development and design of an efficient security methods. An improved principal component
analysis (IPCA) method is utilized to mine the important features from the normalizing datasets.
Later, a hybrid grasshopper crow search optimizer (GSCSO) is used to select the significant
features for testing and training processes. At last, an isolated heuristic neural networks
(IHNNs) method is employed to forecast the flow of data is intrusive or normal. Arthi et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
target to improve intellectual Software Defined Networks (SDNs) to enable protected structures
for IoT healthcare systems. This method presents a hybrid of DL and ML methods (DNN + SVM)
to detect network intrusion in the sensor based health care data. Additionally, this method could
effectively monitor suspicious behaviors and connected devices. At last, the technique assesses
the performances of the presented method by utilizing several metrics performances based on
the scenarios of healthcare applications.
      </p>
      <p>Alsubaei et al. [14] propose a new DL method, the ResNeXt technique, and embedding
Gated Recurrent Unit (GRU) method (RNT). The systematized method contains SMOTE for
handling data inequality throughout the early processing of data. This method's discriminatory
ability is enhanced, especially in the process of feature extractions. The ensemble method of
feature extraction exhibits critical data patterns. Fundamental to our AI classification is the RNT
method, optimization by utilizing hyper-parameters over the Jaya optimizer technique (RNT-J).
Almuqren et al. [15] introduce an Explainable AI Enabled Intrusion Detection Method for
Secure Cyber Physical Systems (XAIID-SCPSs). The presented XAIID-SCPS method mostly
focuses on the classification and ID in the CPS platforms. A Hybrid Enhanced Glowworm
Swarm Optimizer (HEGSO) method has been used for FS. For ID, the Enhanced Elman Neural
Networks (IENNs) method has been employed with an Enhanced Fruit Fly Optimizer (EFFO)
method for the optimization of parameters. In addition, the developed method incorporates the
XAI method LIME for understanding and better perceptive of the Blackbox technique for the
intrusions of precise classifications.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Methodology</title>
      <p>In this article, we focus on the design of CSOXAI-PDC technique on CPS. The projected
CSOXAI-PDC method emphasizes the effectual classification and recognition of phishing based
on CPS. To attain this, the CSOXAI-PDC technique involved data normalization, classification
using DQN, CSO based fine-tuning of hyperparameter, and LIME. Fig. 1 shows the workflow
of CSOXAI-PDC technique.</p>
      <p>Primarily, the CSOXAI-PDC technique executes data normalization method. Z-score
normalization is a critical data pre-processing approach for phishing recognition, as it converts
a value of features within a standard scale using a standard deviation of 1 and mean of 0 [16].
These methodologies underline differences from the mean to make it simple to identify
abnormalities symbolic of phishing challenges. Through Z-score normalization, data
standardization improves the reliability and precision of machine learning (ML) methods to
detect phishing attacks.
3.2.</p>
      <sec id="sec-3-1">
        <title>DQN Classifier</title>
        <p>Next, the classification of phishing recognition occurs by utilizing the DQN classifier. To
diminish the cost of computational related to the iterative procedure, neural networks are used
to estimate the value function of state‐action [17]. Firstly, the upgrade function of 0‐learning
can be stated as:</p>
        <p>(, ) ← (, ) +  - +  m!a!x (", ") − (, )4 (1)</p>
        <p>
          A fluctuating rate of learning  within the interval [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ] is employed to balance the
importance of the present environment’s learning experience against previous ones. Where, #
and # denotes the state and action numbers in the following process. The Deep Q‐Network
(DQN) incorporates neural network methods with Q‐learning and was presented to estimate
the action‐ value function in higher‐dimensional state space.
        </p>
        <p>(, |) ≈ (, )
(2)</p>
        <p>In Q‐Learning, only neural networks and a target Q network are employed, DQN includes
experience replay in training. The stochastic gradient descent (SGD) technique is used to
upgrade the parameters of network in the training procedure. The DQN loss function is stated
below:</p>
        <p>() = [( − (, |))$]
The optimization objective for the state‐action function is expressed below:
(3)
 =  +  m!a!x (#, #|) (4)</p>
        <p>Here,  signifies a parameter of neural network, the policy gradient model is a model‐free
technique intended to enhance the predictable total return of a tactic, discovering the optimum
tactic directly in the strategy space. The greedy policy picks the action, which boosts the
function of value on every occasion. Conversely, action and state values that were not tested
earlier will not be selected afterward because they are not assessed. The ‐greedy policy
integrates the advantages of exploitation and exploration. Actions are selected stochastically
from every obtainable action with a probability of , whereas the finest action is nominated
with a probability of 1 − .
3.3.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Parameter Selection</title>
        <p>For enhancing the classification performance of DQN classifier, the hyperparameter tuning
method can be done using the CSO algorithm. The nature of chickens creates them a special
type of poultry animal, and often they manage their food‐searching efforts in clusters [18].
Hens, chicks, and roosters are three different classes of chicken flocks. According to different
foraging capacities, there is a foraging hierarchal order in the group. Hens forage after roosters
owing to their less foraging abilities, whereas chicks follow the lead because they have inferior
foraging abilities. The chicken population shows that the chicks are arranged around the hen,
the rooster occupies the center of population, and the hens are positioned around the rooster.
Accordingly, there is competition among similar individual species, namely hens and hens,
roosters and roosters, or among members of diverse species, namely hens and chicks, through
the foraging process. For instance, hen groups %, $ forage around rooster $ and acquire the
foraging pattern of rooster $ that define the foraging direction of hens %, $. Simultaneously,
as hen $ is closer to the rooster %, the foraging patterns of rooster % affects hen $ towards
a certain range. Chicks &amp;, ' and ( will forage around hen $, which learn foraging patterns,
and hen $ define the foraging direction of chicks &amp;, ' and (. The CSO algorithm was
inspired by self‐organizing evolution of intelligence and the coexistence of learning.</p>
        <p>The objective function that requires an optimum solution is the optimizer object, and its
variables are composed of ‐dimensional vector space , where  is the number and  is the
dimensionality, and  represents positive integer. The fitness value  differentiates the chick,
rooster, and hen flocks. The chick group ) is allocated to the CN individual with the high fitness
values; the rooster group ) is allocated to the  individual with the lower fitness values; and,
the residual  individuals are allocated to the hen cluster *. ,  and  denotes the
rooster, hen, and chick groups, respectively.</p>
        <p>* = {%, $, … , +, }
) = {%, $, … , -, }
) = {%, $, … , ., }
(5)
(6)
(7)</p>
        <p>All the chicks have an individual mother hen, and all the hens have a matching individual
dominant male. The succeeding formula updates the foraging position of rooster, hen, and chick
individuals:
1) Computation equation for the rooster group
/2,13 = )2,*[1 + (0, $)]
1, ) ≤ 4</p>
        <p>5".75#
$ = W|9$̇|3ℰ,</p>
        <p>) &gt; 4
 ∈ [1, ],  ≠</p>
        <p>
          Where 2 denotes the location of the 2; roosters at the 2; dimension after 2; iteration,
0, $ denotes the Gaussian distribution random value within [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ]. The fitness value of an
individual is , and  is the random rooster index keeping the denominator from 0.
2) Computation equation for the hen group
)2,3*% = /2,1 + % ∗  ∗ a.2) − /2,1c + $ ∗  ∗ a2 − /2,1c (10)
% =  .) − &lt;.) (11)
        </p>
        <p>|.) | + 
$ = 5&amp;'75'# (12)</p>
        <p>
          Where 2 denotes the location of 2; hens in the 2; dimension after 2; iterations. 
denotes the random =&lt; within [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ]. .2) shows the leader rooster location of the 2; hen
afterward 2; iterations; 2 shows the location after 2; iterations of the random individual
chosen between the other roosters and %, and $ are the influence factors of roosters and hens.
The fitness value of the 2; hens are indicated as .) . &lt;.) and +. are the fitness values of the
rooster and random individuals.
        </p>
        <p>3) Calculation formula for the hen group:</p>
        <p>)2,*3% = )2,* +  ∗ (*2 − /2,1 (13)</p>
        <p>
          Where )2* and *2are the location of the 2; chick and hens in the 2; dimension after 2;
iterations;  refers to a random integer within [
          <xref ref-type="bibr" rid="ref2">0,2</xref>
          ].
        </p>
        <p>The CSO obtains a FF to achieve heightened classifier performances. It identifies a positive
numeral to express the best performances of the candidate solutions. In this research, the
minimization of the classifier rate of error is examined as the FF, as delivered in Eq. (14).
(8)
(9)
()) = ())</p>
        <p>.   
=
 .  
∗ 100
(14)
3.4.</p>
      </sec>
      <sec id="sec-3-3">
        <title>LIME Model</title>
        <p>Eventually, the CSOXAI-PDC method incorporates the XAI method LIME for enhanced
clarification and perception of the black-box procedure for precise identification of intrusions.
LIME has appeared as a dominant device in the domain of XAI, mainly for the classification of
text responsibilities [19]. LIME functions by creating disturbed input data examples and spotting
the changes in the predictive model. In the text classification context, LIME offers local,
humanaccountable descriptions for single predictions, permitting users to know how a particular
decision was achieved. For example, in natural language processing (NLP) applications, LIME
can emphasize the important phrases or terms in a document that are greatly subjective to the
classification result. This interpretability is critical for constructing trust in the AI approach,
particularly in fields where accountability and transparency are paramount namely finance or
healthcare. LIME’s capability for shedding light on the decision-making method of the
composite approach improves its value in different applications and promotes the liable
utilization of AI schemes. Its assistance with interpretability and transparency makes good a
valuable device for practitioners, investigators, and stakeholders to try to find validate, and
comprehend the results.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Results and Analysis</title>
      <p>The experimental analysis of the CSOXAI-PDC technique is examined utilizing phishing
emails dataset [20], which encompasses 10000 samples with two classes illustrated in Table 1.
&gt; of 98.33%, ? of 98.34%, @ of 98.33%, 4AB&lt;= of 98.33%, and 4AB&lt;= of 98.33%.
Similarly, with 30%TESP, the CSOXAI-PDC approach acquires average &gt; of 98.38%, ?
of 98.36%, @ of 98.38%, 4AB&lt;= of 98.37%, and 4AB&lt;= of 98.38%.
Legitimate email
Phishing email</p>
      <p>Average</p>
      <p>In Fig. 4, the training and validation accuracy outcomes of the CSOXAI-PDC methodology
can be displayed. The accuracy values are computed throughout 0-25 epoch counts. This figure
underscored that the training and validation accuracy values show growing trend that informed
the capacity of the CSOXAI-PDC method with better performance over numerous iterations.
Furthermore, the training accuracy and validation accuracy rest nearer over the epoch counts
that exhibit least minimum overfitting and display improved performance of the CSOXAI-PDC
technique, ensuring continuous prediction on hidden samples.</p>
      <p>In Fig. 5, the training and validation loss graph of the CSOXAI-PDC system was depicted.
The loss values are calculated for 0-25 epoch counts. It is denoted that the training and
validation accuracy values demonstrate a minimum trend that reported the capability of the
CSOXAI-PDC system to balance a trade-off between generalization and data fitting. The steady
decrease in loss values in addition assurances the superior performance of the CSOXAI-PDC
approach and tuning the prediction outcomes in time.</p>
      <p>To demonstrate the superior performance of the CSOXAI-PDC model, a short comparative
analysis can be produced in Table 3 and Fig. 6 [21]. This outcome illustrated that the LR and the
decision forest technique have demonstrated least classification outcomes. In the meanwhile,
SVM, the locally-deep SVM, Boosted DT, and averaged perceptron approaches have been tested
to execute slightly adjacent classification results [22]. Additionally, the NN model has shown
reasonable performance with &gt; of 97.70%, ? of 96.40%,@ of 89.30%, and 4AB&lt;= of
92.70%. On the other hand, the CSOXAI-PDC model illustrates promising performance with
&gt; of 98.38%, ? of 98.36%,@ of 98.38%, and 4AB&lt;= of 98.37%.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this study, we focus on the design of CSOXAI-PDC technique on CPS. The projected
CSOXAI-PDC method emphasizes the effectual classification and recognition of phishing based
on CPS. To attain this, the CSOXAI-PDC technique first executes data normalization method.
Next, the classification of phishing recognition occurs by utilizing DQN classifier. For
enhancing the classification performance of DQN classifier, the hyperparameter tuning method
can be done using the CSO algorithm. Eventually, the CSOXAI-PDC method incorporates the
XAI method LIME for superior clarification and perception of the black-box procedure for
accurate identification of intrusions. The experimental analysis of the CSOXAI-PDC algorithm
is executed against real dataset and the results establish the improvement of the projected
method over recent techniques.
[14] R. Arthi, S. Krishnaveni, S. Zeadally, An intelligent SDN-IoT enabled intrusion detection
system for healthcare systems using a hybrid deep learning and machine learning
approach, China Communications., (2024).
[15] F. S. Alsubaei, A. A. Almazroi, N. Ayub, Enhancing Phishing Detection: A Novel Hybrid</p>
      <p>Deep Learning Framework for Cybercrime Forensics, in IEEE Access, 12, (2024) 8373-8389.
[16] L. Almuqren, M.S. Maashi, M. Alamgeer, H. Mohsen, M.A. Hamza, A.A. Abdelmageed,
Explainable artificial intelligence enabled intrusion detection technique for secure
cyberphysical systems, Applied Sciences, 13.5, (2023) 3081.
[17] H.A. Prihanditya, The implementation of z-score normalizatio, boosting techniques to
increase accuracy of c4, 5 algorithm in diagnosing chronic kidney disease. Journal of Soft
Computing Exploration, 1.1, (2020) 63-69.
[18] R. BOUMEGOURA, Y. ZENNIR, S.F. TAMINE, Deep Q-Learning-Based Trajectory
Optimization for Vehicle Navigation in CARLA, Algerian Journal of Signals and Systems,
9.2, (2024) 128-133.
[19] Chen, L. Cao, C. Chen, Y. Chen, Y. Yue, A comprehensive survey on the chicken swarm
optimization algorithm and its applications: state-of-the-art and research challenges,
Artificial Intelligence Review, 57.7, (2024) 170.
[20] T. Aljrees, Improving Prediction of Arabic Fake News Using ELMO’s Features-Based
Tri</p>
      <p>Ensemble Model and LIME XAI, in IEEE Access,12, (2024) 63066-63076.
[21] https://www.kaggle.com/datasets/subhajournal/phishingemails
[22] A. Mughaid, S. AlZu’bi, A. Hnaif, S. Taamneh, A. Alnajjar, E.A. Elsoud, An intelligent cyber
security phishing detection system using deep learning techniques, Cluster Computing,
25.6, (2022) 3819-3828.
[23] M. Ragab, Hybrid firefly particle swarm optimisation algorithm for feature selection
problems, Expert Systems, 41.7(2024) e13363.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C. B.</given-names>
            <surname>Monteiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>França</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Arthur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Iano</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Look</surname>
          </string-name>
          <article-title>at Machine Learning in the Modern Age of Sustainable Future Secured Smart Cities, in Data-Driven Mining, Learning and Analytics for Secured Smart Cities</article-title>
          , Cham: Springer, (
          <year>2021</year>
          )
          <fpage>359</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.A.</given-names>
            <surname>Barraclough</surname>
          </string-name>
          , G. Fehringer,
          <string-name>
            <given-names>J.</given-names>
            <surname>Woodward</surname>
          </string-name>
          ,
          <article-title>Intelligent cyber-phishing detection for online</article-title>
          ,
          <source>Computers &amp; Security</source>
          ,
          <volume>104</volume>
          , (
          <year>2021</year>
          )
          <fpage>102123</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Balogun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. O.</given-names>
            <surname>Akande</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. E.</given-names>
            <surname>Usman-Hamza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Adeyemo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Mabayoje</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Ameen</surname>
          </string-name>
          ,
          <article-title>Rotation Forest-Based Logistic Model Tree for Website Phishing Detection</article-title>
          ,
          <source>in Proc. International Conference on Computational Science and Its Applications</source>
          , Cham, Springer, (
          <year>2021</year>
          )
          <fpage>154</fpage>
          -
          <lpage>169</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          ,
          <article-title>A study of feature selection and dimensionality reduction methods for classification-based phishing detection system</article-title>
          ,
          <source>International Journal of Information Retrieval Research (IJIRR)</source>
          ,
          <volume>11</volume>
          .1, (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Salama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <article-title>Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System</article-title>
          ,
          <source>Computer Systems Science &amp; Engineering, 46.3</source>
          (
          <year>2023</year>
          )
          <fpage>2917</fpage>
          -
          <lpage>2932</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.F. S.</given-names>
            <surname>Sabir</surname>
          </string-name>
          ,
          <article-title>Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment</article-title>
          ,
          <source>Sustainable Energy Technologies and Assessments</source>
          ,
          <volume>52</volume>
          (
          <year>2022</year>
          )
          <fpage>102311</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Ahad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Paiva</surname>
          </string-name>
          , G. Tripathi,
          <string-name>
            <given-names>N.</given-names>
            <surname>Feroz</surname>
          </string-name>
          ,
          <article-title>Enabling technologies and sustainable smart cities</article-title>
          ,
          <source>Sustainable cities and society, 61 102301</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.A.</given-names>
            <surname>Aina</surname>
          </string-name>
          ,
          <article-title>Achieving smart sustainable cities with GeoICT support: The Saudi evolving smart cities</article-title>
          ,
          <source>Cities</source>
          ,
          <volume>71</volume>
          , (
          <year>2017</year>
          )
          <fpage>49</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Gandotra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>An efficient approach for phishing detection using machine learning</article-title>
          ,
          <source>in Multimedia Security</source>
          , Singapore: Springer, (
          <year>2021</year>
          )
          <fpage>239</fpage>
          -
          <lpage>253</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N. Q.</given-names>
            <surname>Do</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Selamat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Krejcar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Herrera-Viedma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fujita</surname>
          </string-name>
          ,
          <article-title>Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions</article-title>
          , in IEEE Access,
          <volume>10</volume>
          , (
          <year>2022</year>
          )
          <fpage>36429</fpage>
          -
          <lpage>36463</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <article-title>An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>165</volume>
          , (
          <year>2021</year>
          )
          <fpage>113863</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Alotaibi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sayed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Samir Abd</given-names>
            <surname>Elhameed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Alghushairy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Assiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Saadeldeen</given-names>
            <surname>Ibrahim</surname>
          </string-name>
          ,
          <article-title>Enhancing Security in IoT-Assisted UAV Networks Using Adaptive Mongoose Optimization Algorithm With Deep Learning</article-title>
          ,
          <source>in IEEE Access</source>
          ,
          <volume>12</volume>
          , (
          <year>2024</year>
          )
          <fpage>63768</fpage>
          -
          <lpage>63776</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ramachandran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Albathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <article-title>Enhancing cloud-based security: a novel approach for efficient cyber-threat detection using GSCSO-IHNN model</article-title>
          ,
          <source>Systems</source>
          ,
          <volume>11</volume>
          .
          <fpage>10</fpage>
          , (
          <year>2023</year>
          )
          <fpage>518</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>