Published on: April 2026
UNIFIED URL AND QR BASED PHISHING DETECTION FRAMEWORK
Kondaboina Blessy Kannoju Abhiram Samboju Nikhil Guguloth Sanjay
P Manoj Kumar
Article Status
Available Documents
Abstract
How to Cite this Paper
Blessy, K., Abhiram, K., Nikhil, S. & Sanjay, G. (2026). Unified URL and QR Based Phishing Detection Framework. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.015
Blessy, Kondaboina, et al.. "Unified URL and QR Based Phishing Detection Framework." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.015.
Blessy, Kondaboina,Kannoju Abhiram,Samboju Nikhil, and Guguloth Sanjay. "Unified URL and QR Based Phishing Detection Framework." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.015.
References
[1] O. K. Sahingoz, E. Buber, C. Demirkol, and B. Diri, “Real‑Time Phishing Detection Based on Machine Learning Approaches,” IEEE Access, vol. 7, pp. 59064–59082, 2019, doi: 10.1109/ACCESS.2019.2906889
[2] S. Verma and S. Das, “Phishing URL Detection Using Machine Learning Techniques,” Procedia Computer Science, vol. 132, pp. 1063–1072, 2018, doi:10.1016/j.procs.2018.09.032.
[3] S. Marchal, T. Stateva, and M. Dacier, “PhishStorm: Detecting Phishing With Streaming Analytics,” IEEE Transactions on Network and Service Management, vol. 11, no. 4, pp. 427–440, 2014, doi:10.1109/TNSM.2014.2364674.
[4] C. Feng et al., “Neural Network‑Based Phishing Detection System,” Applied Sciences, vol. 9, no. 23, Art. no. 5076, 2019, doi: 10.3390/app9235076.
[5] S. U. Rehman et al., “Efficient Detection of Phishing Websites Using ML Algorithms,” Computers & Security, vol. 95, Art. no. 101857, 2020, doi:10.1016/j.cose.2020.101857.
[6] A. Kumar and R. Kumar, “Malicious URL Detection Using Machine Learning Techniques,” Journal of Intelligent & Fuzzy Systems, vol. 41, no. 4, pp. 4801–4814, 2021, doi:10.3233/JIFS-201492.
[7] A. Sakhare and B. Raman, “Phishing Detection Using Advanced AI Techniques,” Expert Systems with Applications, vol. 205, Art. no. 117622, 2022, doi:10.1016/j.eswa.2022.117622.
[8] T. Korkmaz et al., “URL‑Based Phishing Detection Using Feature Extraction,” Journal of Network and Computer Applications, vol. 159, Art. no. 102404, 2020, doi:10.1016/j.jnca.2020.102404.
[9] D. Sahoo, Q. M. Mahmood, and A. H. Shakil, “A Survey on Malicious URL Detection Using Machine Learning,” ACM Computing Surveys (CSUR), vol. 50, no. 6, Art. no. 84, 2017, doi:10.1145/3124374.
[10] P. Kieseberg, M. Mulazzani, M. Huber, and E. Weippl, “QR Code Security and Privacy Risks Analysis,” in Lecture Notes in Computer Science (LNCS), vol. 6402, Springer, pp. 95–108, 2010, doi:10.1007/978‑3‑642‑16252‑3_7.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 04 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

