Return to Article Details Comparative analysis of transformer models and hybrid architectures in phishing content detection tasks Download Download PDF