Abstract: The rise in internet traffic has increased cyber threats, with malicious URLs being a major attack vector. Traditional rule-based methods are no longer sufficient, prompting the use of ...