<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1745083</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Deep Learning</subject>
                                                            <subject>Neural Networks</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Derin Öğrenme</subject>
                                                            <subject>Nöral Ağlar</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>E-posta Kimlik Avı Sınıflandırması için Derin Öğrenme ve Açıklanabilir Yapay Zekâ: TabNet, NODE ve FT-Transformer Modellerinin Karşılaştırmalı Bir İncelemesi</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Deep Learning and Explainable AI for Email Phishing Classification: A Comparative Study of TabNet, NODE and FT-Transformer Models</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0003-3729-8170</contrib-id>
                                                                <name>
                                    <surname>Asal</surname>
                                    <given-names>Burçak</given-names>
                                </name>
                                                                    <aff>ADANA BİLİM VE TEKNOLOJİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-3880-3039</contrib-id>
                                                                <name>
                                    <surname>Oyucu</surname>
                                    <given-names>Saadin</given-names>
                                </name>
                                                                    <aff>GAZİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9203-697X</contrib-id>
                                                                <name>
                                    <surname>Doğan</surname>
                                    <given-names>Ferdi</given-names>
                                </name>
                                                                    <aff>ADIYAMAN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-9313-4910</contrib-id>
                                                                <name>
                                    <surname>Polat</surname>
                                    <given-names>Onur</given-names>
                                </name>
                                                                    <aff>BİNGÖL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2563-1218</contrib-id>
                                                                <name>
                                    <surname>Aksöz</surname>
                                    <given-names>Ahmet</given-names>
                                </name>
                                                                    <aff>Kayseri University</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260329">
                    <day>03</day>
                    <month>29</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>29</volume>
                                        <issue>3</issue>
                                        <fpage>1</fpage>
                                        <lpage>13</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250717">
                        <day>07</day>
                        <month>17</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250929">
                        <day>09</day>
                        <month>29</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Siber güvenlik tehditlerinin değişen yapısında, kimlik avı e-postaları sürekli ve yıkıcı bir saldırı vektörü olmaya devam etmektedir. Bu çalışma, tablosal veriler kullanılarak gerçekleştirilen bir kimlik avı e-posta sınıflandırma görevinde, TabNet, NODE (Neural Oblivious Decision Ensembles) ve FT-Transformer mimarilerine odaklanarak derin öğrenme modellerinin etkinliğini araştırmaktadır. Kullanılan veri kümesi, e-postaların dilsel ve yapısal özelliklerini yansıtan sekiz giriş özelliği ile birlikte kimlik avı ya da normal sınıflandırmasını belirten ikili bir etiketi içermektedir. Ayrıca, veri kümesinde gözlenen ciddi sınıf dengesizliği problemiyle başa çıkmak amacıyla NearMiss alt örnekleme yaklaşımı uygulanmıştır. Deneysel sonuçlar, her üç modelin de güçlü performanslar sergilediğini ancak FT-Transformer modelinin en yüksek doğruluk (accuracy) ve dengeli hassasiyet-duyarlılık (precision-recall) skorlarıyla TabNet ve NODE modellerinden daha iyi performans gösterdiğini ortaya koymaktadır. Ayrıca, FT-Transformer modelinin karar verme sürecini yorumlamak için SHAP ve LIME gibi açıklanabilir yapay zekâ (XAI) yöntemleri kullanılmıştır ki bu karar verme süreci yazım hataları, eşsiz kelime sayıları ve aciliyetle ilişkili anahtar kelimelerin kimlik avı tespitinde kritik bir rol oynadığı vurgulamaktadır. Elde edilen bulgular, siber güvenlik alanındaki sekmeli veriler üzerinde transformer tabanlı yaklaşımların potansiyelini vurgulamakta ve kimlik avı tespit sistemlerinde güven ve şeffaflığı artırmak adına açıklanabilir yapay zekânın önemini ortaya koymaktadır.</p></trans-abstract>
                                                                                                                                    <abstract><p>In the changing landscape of cybersecurity threats, phishing emails indicate a persistent and damaging attack vector. This study investigates the effectiveness of deep learning models on a phishing email classification task using tabular data and focusing on TabNet, NODE (Neural Oblivious Decision Ensembles), and FT-Transformer architectures. The utilized dataset includes eight input features capturing linguistic and structural characteristics of emails, with a binary label indicating phishing or normal classification. Additionally, the NearMiss under-sampling approach is applied to address the significant class imbalance. Experimental results demonstrate that while all three models achieve strong performance, the FT-Transformer model outperforms TabNet and NODE by achieving the highest classification accuracy and balanced precision-recall scores. Additionally, explainable artificial intelligence (XAI) methods, SHAP and LIME, are employed to interpret the FT-Transformer model’s decision-making process, which highlights the critical role of spelling errors, unique word counts, and urgency-related keywords in phishing detection. The findings emphasize the potential of transformer-based approaches for tabular cybersecurity applications and indicate the importance of interpretable AI in enhancing trust and transparency in phishing detection systems.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Explainable Artificial Intelligence (XAI)</kwd>
                                                    <kwd>  TabNet</kwd>
                                                    <kwd>  NODE</kwd>
                                                    <kwd>  FT-Transformer</kwd>
                                                    <kwd>  Email Phishing Classification</kwd>
                                                    <kwd>  SHAP</kwd>
                                                    <kwd>  LIME</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Açıklanabilir Yapay Zeka</kwd>
                                                    <kwd>  TabNet</kwd>
                                                    <kwd>  NODE</kwd>
                                                    <kwd>  FT-Transformer</kwd>
                                                    <kwd>  E-posta Kimlik Avı Sınıflandırması</kwd>
                                                    <kwd>  SHAP</kwd>
                                                    <kwd>  LIME</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Apwg, “Phishing Activity Trends Report”, 4th Quarter 2023. 2024, Anti-Phishing Working Group, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Proofpoint, “2024 State of the Phish – Today’s Cyber Threats and Phishing Protection”, Proofpoint, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Ünal, C. and Şahin, İ., “İstenmeyen Elektronik Postaların (SPAM) Filtrelenmesi için Bir Uzman Sistem Tasarımı ve Gerçekleştirilmesi.”, Politeknik Dergisi, 20(2), 267-274, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Çıtlak, O., Dörterler, M. and Dogru, İ., “A hybrid spam detection framework for social networks.”, Politeknik Dergisi, 26(2), 823-837, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Fan, Z., Li, W., Laskey, K. B. and Chang, K. C., “Investigation of phishing susceptibility with explainable artificial intelligence.”, Future Internet, 16(1), 31, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Divakaran, D.M. and A. Oest, “Phishing detection leveraging machine learning and deep learning: A review.”, IEEE Security &amp; Privacy, 20(5): p. 86-95, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Zuraiq, A.A. and M. Alkasassbeh. “Phishing detection approaches.”, In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), IEEE, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Mohammad, R.M., F. Thabtah, and L. McCluskey, “Intelligent rule‐based phishing websites classification.”, IET Information Security, 8(3): p. 153-160, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Pentapalli, L.S., et al., “A Gradient-Optimized TSK Fuzzy Framework for Explainable Phishing Detection.”, arXiv preprint arXiv:2504.18636, (2025).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Gautam, S., K. Rani, and B. Joshi. “Detecting phishing websites using rule-based classification algorithm: a comparison.”, In Information and Communication Technology for Sustainable Development: Proceedings of ICT4SD 2016, Volume 1. Springer, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Najjar-Ghabel, S., S. Yousefi, and P. Habibi., “Comparative Analysis and Practical Implementation of Machine Learning Algorithms for Phishing Website Detection.”, in 2024 9th International Conference on Computer Science and Engineering (UBMK), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Raj, D., R. Kumar, and S. Joshi. “Automated AI System for Online Phishing Detection and Mitigation.”, in 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	G, G., T. Vidhyabharathi, and V. Sangeetha, “Outsmarting Phishers: A Comparative Analysis of Machine Learning Techniques.”, Journal of Information Technology and Digital World, 6(4): p. 347-361, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Singh, P., T. Hasija, and K. Ramkumar. “Integrated Machine Learning Approach to Phishing Detection: Comparing SVM, Random Forest, and XGBoost Models.”, in 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS), IEEE (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Saraswathi, P., et al. “Evaluating the Efficacy of Machine Learning Methods in Phishing Detection: A Comparative Analysis.”, in 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	El-Metwaly, A.E.-S., et al. “Detection of Phishing URLs Based on Machine Learning and Cybersecurity.”, in 2024 International Telecommunications Conference (ITC-Egypt), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Sarma, D., et al. “Comparative analysis of machine learning algorithms for phishing website detection.”, in Inventive Computation and Information Technologies: Proceedings of ICICIT 2020, Springer, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Lone, A.N., et al. “Performance Evaluation on Detection of Phishing Websites Using Machine Learning Techniques.” in 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Dwivedi, D., et al., “Machine learning-powered defense against phishing websites.”, in 2024 IEEE International Students&#039; Conference on Electrical, Electronics and Computer Science (SCEECS), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Mousavi, S., M. Bahaghighat, and F. Ozen., “Advancements in Phishing Website Detection: A Comprehensive Analysis of Machine Learning and Deep Learning Models.”, in 2024 32nd Signal Processing and Communications Applications Conference (SIU), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Ahmad, K.I., et al., “A Data-Driven Approach for Online Phishing Activity Detection.”, in 2024 International Conference on Advances in Computing, Communication, Electrical, and Smart Systems (iCACCESS), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Altwaijry, N., et al., “Advancing phishing email detection: A comparative study of deep learning models.”, Sensors, 24(7): p. 2077, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Lobo, R., M.N. Abbas, and M.N. Asghar., “Email Phishing Attack Detection using Recurrent and Feed-forward Neural Networks.”, in 2023 Cyber Research Conference-Ireland (Cyber-RCI), IEEE, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Truong, C.K., P. Hao Do, and T. Duc Le, “A comparative analysis of email phishing detection methods: a deep learning perspective.”, IET, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	MohamedAli, R.S. and R.A. Abduhameed., “Phishing Email Detection: Survey.”, in International Conference on Advanced Engineering, Technology and Applications, Springer, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Atawneh, S. and H. Aljehani, “Phishing email detection model using deep learning.”, Electronics, 12(20): p. 4261, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Yu, S., et al., “Phishing detection based on multi-feature neural network.”, in 2022 IEEE International Performance, Computing, and Communications Conference (IPCCC), IEEE, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Alshingiti, Z., et al., “A deep learning-based phishing detection system using CNN, LSTM, and LSTM-CNN.”, Electronics, 12(1): p. 232, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Do, N.Q., et al., “Deep learning for phishing detection: Taxonomy, current challenges and future directions.”, Ieee Access, 10: p. 36429-36463, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Camenisch, J., et al.,  “JCS special issue on EU-funded ICT research on Trust and Security.”, SAGE Publications Sage UK: London, England. p. 1-5, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	AbuAlghanam, O., et al., “A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities.”, Journal of Information Security and Applications, 67: p. 103173, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Gorishniy, Y., et al., “Revisiting deep learning models for tabular data.”, Advances in neural information processing systems, 34: p. 18932-18943, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Ribeiro, M.T., S. Singh, and C. Guestrin., “&quot; Why should i trust you?&quot; Explaining the predictions of any classifier.”, in Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34]	El Aassal, A., et al., “An in-depth benchmarking and evaluation of phishing detection research for security needs.”, Ieee Access, 8: p. 22170-22192, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35]	Zeng, V., et al., “Diverse datasets and a customizable benchmarking framework for phishing.”, in Proceedings of the Sixth International Workshop on Security and Privacy Analytics, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36]	Champa, A.I., F. Rabbi, and M.F. Zibran., “Why phishing emails escape detection: A closer look at the failure points.”, in 2024 12th International Symposium on Digital Forensics and Security (ISDFS), IEEE, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37]	Sánchez-Paniagua, M., et al., “Phishing websites detection using a novel multipurpose dataset and web technologies features.”, Expert Systems with Applications, 207: p. 118010, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">[38]	Bountakas, P. and C. Xenakis, “Helphed: Hybrid ensemble learning phishing email detection.”, Journal of network and computer applications, 210: p. 103545, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39]	KnowBe, “Phishing By Industry Benchmarking Report.” (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40]	SlashNext, “The 2024 Phishing Intelligence Report.” (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">[41]	Elsharief, A.F., “Comparative Evaluation of Machine Learning Models for Phishing Email Detection.”, (2025).</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">[42]	Aleroud, A., Abu-Shanab, E., Al-Aiad, A., and Alshboul, Y. “An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities.”, Journal of Information Security and Applications, 55, 102614, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">[43]	Pantziou, G., F. Makedon, and P. Belsis, “Special issue on privacy and security on pervasive e-health and assistive environments.”, Security &amp; Communication Networks, 4(11), (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">[44]	Arik, S.Ö. and T. Pfister. “Tabnet: Attentive interpretable tabular learning.”, in Proceedings of the AAAI conference on artificial intelligence, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">[45]	Popov, S., S. Morozov, and A. Babenko, “Neural oblivious decision ensembles for deep learning on tabular data.”, arXiv preprint arXiv:1909.06312, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">[46]	Cratchley, E., “Email Phishing Dataset.” https://www.kaggle.com/datasets/ethancratchley/email-phishing-dataset, (2025).</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">[47]	Mani, I. and I. Zhang., “kNN approach to unbalanced data distributions: a case study involving information extraction.” in Proceedings of workshop on learning from imbalanced datasets, ICML United States, (2003).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
