INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue VI, June 2025
www.ijltemas.in Page 769
18. Venugopal, S., Viswanath, S., & Anitha, R. (2020). A blockchain-based framework for phishing detection and
prevention. In Blockchain Technology for Industry 4.0 (pp. 239-257). Springer, Singapore.
19. Azeez, N. A., & Venter, I. M. (2021). Towards ensuring scalability, interoperability and efficient access control in a
multi-domain IoT-based healthcare system. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6213-
6230.
20. Mohebzada, J. G., El Zarka, A., Bhojani, A. H., & Darwish, A. (2022). The phishing landscape: A look at current trends
and research. Future Generation Computer Systems, 128, 187-204.
21. Wu, C. Y., Kuo, C. C., & Yang, C. S. (2019). A phishing detection system based on machine learning. In 2019
International Conference on Intelligent Computing and its Emerging Applications (ICEA) (pp. 28-32). IEEE.
22. Alnemari, S., & Alshammari, M. (2023). Detecting phishing domains using machine learning. Applied Sciences, 13(8),
4649.
23. Alshingiti, Z., Alaqel, R., Al-Muhtadi, J., Haq, Q. E. U., Saleem, K., & Faheem, M. H. (2023). A deep learning-based
phishing detection system using CNN, LSTM, and LSTM-CNN. Electronics, 12(1), 232.
24. Karim, A., Shahroz, M., Mustofa, K., Belhaouari, S. B., & Joga, S. R. K. (2023). Phishing detection system through
hybrid machine learning based on URL. IEEE Access, 11, 36805-36822.
25. Aldakheel, E. A., Zakariah, M., Gashgari, G. A., Almarshad, F. A., & Alzahrani, A. I. (2023). A Deep learning-based
innovative technique for phishing detection in modern security with uniform resource locators. Sensors, 23(9), 4403.
26. Choudhary, T., Mhapankar, S., Bhddha, R., Kharuk, A., & Patil, R. (2023). A Machine Learning Approach for Phishing
Attack Detection. Journal of Artificial Intelligence and Technology, 3(3), 108-113.
27. Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nuñez-Agurto, D., & Rodríguez-Galán, G. (2023). A
phishing-attack-detection model using natural language processing and deep learning. Applied Sciences, 13(9), 5275.
28. Chinnasamy, P., Krishnamoorthy, P., Alankruthi, K., Mohanraj, T., Kumar, B. S., & Chandran, L. (2024). AI Enhanced
Phishing Detection System. In 2024 Third International Conference on Intelligent Techniques in Control, Optimization
and Signal Processing (INCOS) (pp. 1-5). IEEE.
29. Siva, N., Sivaiah, B. V., Reddy, S. S., Irfan, S., Kumar, U. P., &Nayagara, S. N. (2024). Phishing Detection System
through Hybrid Machine Learning Based on URL. In 2024 5th International Conference for Emerging Technology
(INCET) (pp. 1-5).
30. Hasan, B. M. S., & Abdulazeez, A. M. (2021). A review of principal component analysis algorithm for dimensionality
reduction. Journal of Soft Computing and Data Mining, 2(1), 20-30
31. Salem, N., & Hussein, S. (2019). Data dimensional reduction and principal components analysis. Procedia Computer
Science, 163, 292-299.
32. Aksu, D., Abdulwakil, A., & Aydin, M. A. (2017). Detecting phishing websites using support vector machine algorithm.
PressAcademia Procedia, 5(1), 139-142.
33. Anupam, S., & Kar, A. K. (2021). Phishing website detection using support vector machines and nature-inspired
optimization algorithms. Telecommunication Systems, 76(1), 17-32.
34. Ahmad, W., Ayub, N., Ali, T., Irfan, M., Awais, M., Shiraz, M., & Glowacz, A. (2020). Towards short term electricity
load forecasting using improved support vector machine and extreme learning machine. Energies, 13(11), 2907.
35. Zhang, Y., Hong, J., & Cranor, L. (2020). Cantina+: A feature-rich machine learning framework for detecting phishing
websites. ACM Transactions on Information and System Security (TISSEC), 14(2), 1-28.
36. Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009). Beyond blacklists: Learning to detect malicious web sites from
suspicious URLs. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining (KDD), 2009, 1245-1254
37. Machado, E., Pinto, T., Guedes, V., & Morais, H. (2021). Electrical load demand forecasting using feed-forward neural
networks. Energies, 14(22), 7644.
38. Muruganandam, S., Joshi, R., Suresh, P., Balakrishna, N., Kishore, K. H., &Manikanthan, S. V. (2023). A deep learning
based feed forward artificial neural network to predict the K-barriers for intrusion detection using a wireless sensor
network. Measurement: Sensors, 25, 100613.
39. Ketkar, N., Moolayil, J., Ketkar, N., &Moolayil, J. (2021). Feed-forward neural networks. Deep Learning with Python:
Learn Best Practices of Deep Learning Models with PyTorch, 93-131.
40. Mohammad, R. M., Thabtah, F., & McCluskey, L. V. (2015). Intelligent rule-based phishing website classification. IET
Information Security, 9(4), 267-277