{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:23:44Z","timestamp":1771230224193,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030576714","type":"print"},{"value":"9783030576721","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57672-1_22","type":"book-chapter","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T09:31:47Z","timestamp":1597138307000},"page":"297-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Composition of Ensembles of Recurrent Neural Networks for Phishing Websites Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1804-3618","authenticated-orcid":false,"given":"Paulius","family":"Vaitkevicius","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2281-4035","authenticated-orcid":false,"given":"Virginijus","family":"Marcinkevicius","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,12]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Adebowale, M., Lwin, K., S\u00e1nchez, E., Hossain, M.: Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text. Expert Systems with Applications 115, 300\u2013313 (2019). https:\/\/doi.org\/10.1016\/J.ESWA.2018.07.067, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417418304925?via%3Dihub","DOI":"10.1016\/J.ESWA.2018.07.067"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Anti-Phishing Working Group, I.: Phishing Activity Trends Reports (2019). https:\/\/apwg.org\/resources\/apwg-reports\/","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Bahnsen, A.C., Bohorquez, E.C., Villegas, S., Vargas, J., Gonzalez, F.A.: Classifying phishing URLs using recurrent neural networks. In: 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u20138 (2017). https:\/\/doi.org\/10.1109\/ECRIME.2017.7945048, http:\/\/ieeexplore.ieee.org\/document\/7945048\/","DOI":"10.1109\/ECRIME.2017.7945048"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/72.279181","volume":"5","author":"Y Bengio","year":"1994","unstructured":"Bengio, Y., Simard, P., Frasconi, P.: Learning long-term dependencies with gradient descent is difficult. IEEE Trans. Neural Netw. 5(2), 157\u2013166 (1994). https:\/\/doi.org\/10.1109\/72.279181","journal-title":"IEEE Trans. Neural Netw."},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Chiew, K.L., Tan, C.L., Wong, K., Yong, K.S., Tiong, W.K.: A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Information Sciences 484, 153\u2013166 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.01.064, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025519300763?via%3Dihub linkinghub.elsevier.com\/retrieve\/pii\/S0020025519300763","DOI":"10.1016\/j.ins.2019.01.064"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. arXiv:1406.1078v3 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Cui, B., He, S., Yao, X., Shi, P., Yao, X., He, S., Cui, B.: Malicious URL detection with feature extraction based on machine learning. Int. J. High Performance Comput. Network. 12(2), 166 (2018). https:\/\/doi.org\/10.1504\/ijhpcn.2018.10015545, http:\/\/www.inderscience.com\/link.php?id=94367","DOI":"10.1504\/ijhpcn.2018.10015545"},{"key":"22_CR8","unstructured":"Gers, F.A., Urgen Schmidhuber, J.J., Cummins, F.: Learning to forget: continual prediction with LSTM. In: Proceedings ICANN 1999 International Conference on Artificial Neural Network, vol. 2, pp. 850\u2013855. IDSIA (1999). http:\/\/www.idsia.ch\/www.idsia.ch\/"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Han, J., Moraga, C.: The influence of the sigmoid function parameters on the speed of backpropagation learning. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 930, pp. 195\u2013201. Springer, Cham (1995). https:\/\/doi.org\/10.1007\/3-540-59497-3_175","DOI":"10.1007\/3-540-59497-3_175"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Hochreiter, S., Urgen Schmidhuber, J.J.: Long short-term memory. Neural Computation 9(8), 1735\u20131780 (1997), http:\/\/www7.informatik.tu-muenchen.de\/~hochreitwww.idsia.ch\/~juergen","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"22_CR11","unstructured":"Internet Crime Complaint Center: Internet Crime Report 2019. Tech. rep., Internet Crime Complaint Center at the Federal Bureau of Investigation of United States of America (2020). https:\/\/www.ic3.gov\/media\/annualreport\/2019_IC3Report.pdf"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Kleinbaum, D.G., Klein, M.: Introduction to logistic regression. In: Logistic Regression, pp. 1\u201339. Springer, New York, NY (2010). https:\/\/doi.org\/10.1007\/978-1-4419-1742-3_1, http:\/\/link.springer.com\/10.1007\/978-1-4419-1742-3_1","DOI":"10.1007\/978-1-4419-1742-3_1"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Lewis, D.D.: Naive (Bayes) at forty: The independence assumption in information retrieval. In: ECML 1998: Machine Learning: ECML-1998, pp. 4\u201315. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0026666","DOI":"10.1007\/BFb0026666"},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Lin Tan, C., et al.: PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder. Decision Support Systems 88, 18\u201327 (2016). https:\/\/doi.org\/10.1016\/j.dss.2016.05.005","DOI":"10.1016\/j.dss.2016.05.005"},{"issue":"10","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TC.2017.2703808","volume":"66","author":"S Marchal","year":"2017","unstructured":"Marchal, S., Armano, G., Grondahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66(10), 1717\u20131733 (2017). https:\/\/doi.org\/10.1109\/TC.2017.2703808","journal-title":"IEEE Trans. Comput."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Opara, C., Wei, B., Chen, Y.: HTMLPhish: Enabling Accurate Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis. http:\/\/arxiv.org\/abs\/1909.01135arXiv:1909.01135 (2019), http:\/\/www.phishtank.com","DOI":"10.1109\/IJCNN48605.2020.9207707"},{"key":"22_CR17","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011), http:\/\/jmlr.csail.mit.edu\/papers\/v12\/pedregosa11a.html, https:\/\/scikit-learn.org\/stable\/"},{"key":"22_CR18","unstructured":"Saxe, J., Berlin, K.: eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys. arXiv preprint arXiv:1702.08568, February 2017, http:\/\/arxiv.org\/abs\/1702.08568"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Seifert, C., Welch, I., Komisarczuk, P.: Identification of malicious web pages with static heuristics. In: 2008 Australasian Telecommunication Networks and Applications Conference, pp. 91\u201396. IEEE, December 2008. https:\/\/doi.org\/10.1109\/ATNAC.2008.4783302, http:\/\/ieeexplore.ieee.org\/document\/4783302\/","DOI":"10.1109\/ATNAC.2008.4783302"},{"issue":"3\/4","key":"22_CR20","doi-asserted-by":"publisher","first-page":"591","DOI":"10.2307\/2333709","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro, S.S., Wilk, M.B.: An analysis of variance test for normality (complete samples). Biometrika 52(3\/4), 591\u2013611 (1965)","journal-title":"Biometrika"},{"issue":"1","key":"22_CR21","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"22_CR22","doi-asserted-by":"publisher","first-page":"143","DOI":"10.15388\/20-infor404","volume":"31","author":"P Vaitkevicius","year":"2020","unstructured":"Vaitkevicius, P., Marcinkevicius, V.: Comparison of classification algorithms for detection of phishing websites. Informatica 31(1), 143\u2013160 (2020). https:\/\/doi.org\/10.15388\/20-infor404","journal-title":"Informatica"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Vazhayil, A., Vinayakumar, R., Soman, K.: Comparative study of the detection of malicious URLs using shallow and deep networks. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). pp. 1\u20136. IEEE, July 2018. https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494159, https:\/\/ieeexplore.ieee.org\/document\/8494159\/","DOI":"10.1109\/ICCCNT.2018.8494159"},{"key":"22_CR24","doi-asserted-by":"publisher","unstructured":"Verma, R., Das, A.: What\u2019s in a URL. In: Proceedings of the 3rd ACM on International Workshop on Security And PrivacyAnalytics - IWSPA 2017, pp. 55\u201363. ACM Press, New York, New York (2017). https:\/\/doi.org\/10.1145\/3041008.3041016, http:\/\/dl.acm.org\/citation.cfm?doid=3041008.3041016","DOI":"10.1145\/3041008.3041016"},{"issue":"19","key":"22_CR25","doi-asserted-by":"publisher","first-page":"4258","DOI":"10.3390\/s19194258","volume":"19","author":"B Wei","year":"2019","unstructured":"Wei, B., Hamad, R.A., Yang, L., He, X., Wang, H., Gao, B., Woo, W.L.: A deep-learning-driven light-weight phishing detection sensor. Sensors 19(19), 4258 (2019). https:\/\/doi.org\/10.3390\/s19194258","journal-title":"Sensors"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. The 17th Annual Network and Distributed System Security Symposium (NDSS 2010) (2010). https:\/\/doi.org\/10.1109\/TDSC.2013.3, http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/08.pdf%5Cnresearch.google.com\/pubs\/pub35580.html","DOI":"10.1109\/TDSC.2013.3"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 1\u201328 (2011). https:\/\/doi.org\/10.1145\/2019599.2019606, https:\/\/www.ml.cmu.edu\/research\/dap-papers\/dap-guang-xiang.pdf","DOI":"10.1145\/2019599.2019606"},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"15196","DOI":"10.1109\/ACCESS.2019.2892066","volume":"7","author":"P Yang","year":"2019","unstructured":"Yang, P., Zhao, G., Zeng, P.: Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7, 15196\u201315209 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2892066","journal-title":"IEEE Access"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Zhao, J., Wang, N., Ma, Q., Cheng, Z.: Classifying malicious URLs using gated recurrent neural networks. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 385\u2013394. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-319-93554-6_36","DOI":"10.1007\/978-3-319-93554-6_36"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Zhao, P., Hoi, S.C.: Cost-sensitive online active learning with application to malicious URL detection. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2013, p. 919. ACM Press, New York (2013). https:\/\/doi.org\/10.1145\/2487575.2487647, http:\/\/dl.acm.org\/citation.cfm?doid=2487575.2487647","DOI":"10.1145\/2487575.2487647"}],"container-title":["Communications in Computer and Information Science","Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57672-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T13:46:54Z","timestamp":1667742414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57672-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030576714","9783030576721"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57672-1_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DB&IS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Baltic Conference on Databases and Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbis.ttu.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}