Abstract: Phishing assaults rent fake URLs to gather customers' confidence and retrieve touchy facts, threatening cyber security. Conventional machine learning and rule-based algorithms are often the ...