{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:03:01Z","timestamp":1742990581171,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030133412"},{"type":"electronic","value":"9783030133429"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-13342-9_17","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T03:24:16Z","timestamp":1549509856000},"page":"199-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study on Performance Server Analysis and URL Phishing Prevention to Improve System Management Through Machine Learning"],"prefix":"10.1007","author":[{"given":"Antonio J.","family":"Tall\u00f3n-Ballesteros","sequence":"first","affiliation":[]},{"given":"Simon James","family":"Fong","sequence":"additional","affiliation":[]},{"given":"Raymond Kwok-Kay","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"17_CR1","unstructured":"Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: DeepPhish: simulating malicious AI"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bzdok, D., Krzywinski, M., Altman, N.: Machine learning: supervised methods, SVM and kNN. Nature Methods (2018)","DOI":"10.1038\/nmeth.4551"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/3-540-45571-X_12","volume-title":"Knowledge Discovery and Data Mining. Current Issues and New Applications","author":"M Dash","year":"2000","unstructured":"Dash, M., Liu, H., Motoda, H.: Consistency based feature selection. In: Terano, T., Liu, H., Chen, A.L.P. (eds.) PAKDD 2000. LNCS, vol. 1805, pp. 98\u2013109. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45571-X_12"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress), pp. 635\u2013638. IEEE (2015)","DOI":"10.1109\/BigDataCongress.2015.97"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Fung, G., Mangasarian, O.L.: Data selection for support vector machine classifiers. In: Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 64\u201370. ACM (2000)","DOI":"10.1145\/347090.347105"},{"key":"17_CR6","volume-title":"Applied Data Mining: Statistical Methods for Business and Industry","author":"P Giudici","year":"2005","unstructured":"Giudici, P.: Applied Data Mining: Statistical Methods for Business and Industry. Wiley, Hoboken (2005)"},{"key":"17_CR7","unstructured":"Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning (2000)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Heien, E., Kondo, D., Gainaru, A., LaPine, D., Kramer, B., Cappello, F.: Modeling and tolerating heterogeneous failures in large parallel systems. In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, p. 45. ACM (2011)","DOI":"10.1145\/2063384.2063444"},{"key":"17_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/9781119302872","volume-title":"Pattern Recognition: A Quality of Data Perspective","author":"W Homenda","year":"2018","unstructured":"Homenda, W., Pedrycz, W.: Pattern Recognition: A Quality of Data Perspective. Wiley, Hoboken (2018)"},{"issue":"4","key":"17_CR10","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"17_CR11","unstructured":"Knobbe, A., Van der Wallen, D., Lewis, L.: Experiments with data mining in enterprise management. In: Proceedings of the Sixth IFIP\/IEEE International Symposium on Integrated Network Management, 1999. Distributed Management for the Networked Millennium, pp. 353\u2013366. IEEE (1999)"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40163-014-0009-y","volume":"3","author":"EEH Lastdrager","year":"2014","unstructured":"Lastdrager, E.E.H.: Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Sci. 3(1), 9 (2014)","journal-title":"Crime Sci."},{"issue":"2","key":"17_CR13","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443\u2013458 (2014)","journal-title":"Neural Comput. Appl."},{"key":"17_CR14","unstructured":"Nguyen, L.A.T., To, B.L., Nguyen, H.K., Nguyen, M.H.: A novel approach for phishing detection using URL-based heuristic. In: 2014 International Conference on Computing, Management and Telecommunications (ComManTel), pp. 298\u2013303. IEEE (2014)"},{"key":"17_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29971-1","volume-title":"Computer Performance Optimization","author":"Wolfgang W. Osterhage","year":"2013","unstructured":"Osterhage, W.W.: Computer performance optimization (2013)"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2012-1","volume":"2012","author":"V Ramanathan","year":"2012","unstructured":"Ramanathan, V., Wechsler, H.: phishGILLNET-phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training. EURASIP J. Inf. Secur. 2012(1), 1 (2012)","journal-title":"EURASIP J. Inf. Secur."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-39940-9","volume-title":"Encyclopedia of Database Systems","author":"P Refaeilzadeh","year":"2016","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, pp. 1\u20137. Springer, Boston (2016). https:\/\/doi.org\/10.1007\/978-0-387-39940-9"},{"issue":"4","key":"17_CR18","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2009.4","volume":"7","author":"B Schroeder","year":"2010","unstructured":"Schroeder, B., Gibson, G.: A large-scale study of failures in high-performance computing systems. IEEE Trans. Dependable Secur. Comput. 7(4), 337\u2013350 (2010)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"17_CR19","unstructured":"Shi, H.: Best-first decision tree learning. Ph.D. thesis, The University of Waikato (2007)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Tall\u00f3n-Ballesteros, A.J., Correia, L.: Medium and high-dimensionality attribute selection in Bayes-type classifiers. In: 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI), pp. 121\u2013126. IEEE (2017)","DOI":"10.1109\/IWOBI.2017.7985539"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-319-92639-1_29","volume-title":"Hybrid Artificial Intelligent Systems","author":"AJ Tall\u00f3n-Ballesteros","year":"2018","unstructured":"Tall\u00f3n-Ballesteros, A.J., Correia, L., Xue, B.: Featuring the attributes in supervised machine learning. In: de Cos Juez, F., et al. (eds.) HAIS 2018. LNCS, vol. 10870, pp. 350\u2013362. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92639-1_29"},{"issue":"5\u20136","key":"17_CR22","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/15502287.2016.1178356","volume":"17","author":"AJ Tall\u00f3n-Ballesteros","year":"2016","unstructured":"Tall\u00f3n-Ballesteros, A.J., Ibiza-Granados, A.: Simplifying pattern recognition problems via a scatter search algorithm. Int. J. Comput. Methods Eng. Sci. Mech. 17(5\u20136), 315\u2013321 (2016)","journal-title":"Int. J. Comput. Methods Eng. Sci. Mech."},{"key":"17_CR23","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-319-05885-6_17","volume-title":"Computational Intelligence in Digital Forensics: Forensic Investigation and Applications","author":"AJ Tall\u00f3n-Ballesteros","year":"2014","unstructured":"Tall\u00f3n-Ballesteros, A.J., Riquelme, J.C.: Data mining methods applied to a digital forensics task for supervised machine learning. In: Muda, A.K., Choo, Y.-H., Abraham, A., N. Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. SCI, vol. 555, pp. 413\u2013428. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05885-6_17"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-319-59773-7_54","volume-title":"Biomedical Applications Based on Natural and Artificial Computing","author":"AJ Tall\u00f3n-Ballesteros","year":"2017","unstructured":"Tall\u00f3n-Ballesteros, A.J., Riquelme, J.C.: Low dimensionality or same subsets as a result of feature selection: an in-depth roadmap. In: Ferr\u00e1ndez Vicente, J.M., \u00c1lvarez-S\u00e1nchez, J.R., de la Paz L\u00f3pez, F., Toledo Moreo, J., Adeli, H. (eds.) IWINAC 2017. LNCS, vol. 10338, pp. 531\u2013539. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59773-7_54"},{"key":"17_CR25","unstructured":"Vargas, E., BluePrints, S.: High availability fundamentals. Sun Blueprints series, pp. 1\u201317 (2000)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/11539087_71","volume-title":"Advances in Natural Computation","author":"J Wang","year":"2005","unstructured":"Wang, J., Neskovic, P., Cooper, L.N.: Training data selection for support vector machines. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3610, pp. 554\u2013564. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11539087_71"},{"key":"17_CR27","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS, vol. 10, p. 2010 (2010)"},{"issue":"1","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu, X., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1\u201337 (2008)","journal-title":"Knowl. Inf. Syst."},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, J., Pan, Y., Wang, Z., Liu, B.: URL based gateway side phishing detection method, pp. 268\u2013275. IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0073"},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/A:1007613203719","volume":"41","author":"Z Zheng","year":"2000","unstructured":"Zheng, Z., Webb, G.I.: Lazy learning of Bayesian rules. Mach. Learn. 41(1), 53\u201384 (2000)","journal-title":"Mach. Learn."},{"issue":"1","key":"17_CR31","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s13673-017-0098-1","volume":"7","author":"M Zouina","year":"2017","unstructured":"Zouina, M., Outtaj, B.: A novel lightweight URL phishing detection system using SVM and similarity index. Hum. Centric Comput. Inf. Sci. 7(1), 17 (2017)","journal-title":"Hum. Centric Comput. Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Economics of Grids, Clouds, Systems, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13342-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:03:49Z","timestamp":1710345829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-13342-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030133412","9783030133429"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13342-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GECON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Economics of Grids, Clouds, Systems, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gecon2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.gecon-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}