{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T17:35:32Z","timestamp":1777484132843,"version":"3.51.4"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030607951","type":"print"},{"value":"9783030607968","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60796-8_26","type":"book-chapter","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:02:59Z","timestamp":1602745379000},"page":"301-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)"],"prefix":"10.1007","author":[{"given":"Sohail Ahmed","family":"Khan","sequence":"first","affiliation":[]},{"given":"Wasiq","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Abir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"26_CR1","unstructured":"What is phishing | Attack techniques & scam examples | Imperva, Imperva (2016). \nhttps:\/\/www.imperva.com\/learn\/application-security\/phishing-attack-scam\/\n\n. Accessed 12 June 2019"},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Conference on Email and Anti-Spam (2009). \nhttps:\/\/doi.org\/10.1184\/R1\/6469805.v1","DOI":"10.1184\/R1\/6469805.v1"},{"key":"26_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5421046","author":"AK Jain","year":"2017","unstructured":"Jain, A.K., Gupta, B.B.: Phishing detection: analysis of visual similarity based approaches. Secur. Commun. Netw. (2017). \nhttps:\/\/doi.org\/10.1155\/2017\/5421046","journal-title":"Secur. Commun. Netw."},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992). \nhttps:\/\/doi.org\/10.1145\/130385.130401","DOI":"10.1145\/130385.130401"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: \u201cInduction of decision trees\u201d, readings in machine learning. Mach. Learn. 1, 81\u2013106 (1986). \nhttps:\/\/doi.org\/10.1007\/BF00116251","journal-title":"Mach. Learn."},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001). \nhttps:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"26_CR7","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338\u2013345 (1995). \nhttps:\/\/arxiv.org\/abs\/1302.4964\n\n."},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175\u2013185 (1992). \nhttps:\/\/doi.org\/10.1080\/00031305.1992.10475879","journal-title":"The American Statistician."},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Rosenblatt, F.F.: Princples of neurodynamics. Perceptions and the theory of brain mechanisms. Am. J. Psychol. (1963). \nhttps:\/\/doi.org\/10.2307\/1419730","DOI":"10.2307\/1419730"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"KFRS Pearson","year":"1901","unstructured":"Pearson, K.F.R.S.: On lines and planes of closest fit to systems of points in space. London Edinburgh Dublin Philos. Mag. J. Sci. 2, 559\u2013572 (1901). \nhttps:\/\/doi.org\/10.1080\/14786440109462720","journal-title":"Science"},{"key":"26_CR11","first-page":"203","volume":"15","author":"W Khan","year":"2018","unstructured":"Khan, W., Ansell, D., Kuru, K., Bilal, M.: Flight guardian: autonomous flight safety improvement by monitoring aircraft cockpit instruments. J. Aerospace Inf. Syst. AIAA 15, 203\u2013214 (2018)","journal-title":"J. Aerospace Inf. Syst. AIAA"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2017.13","volume":"32","author":"W Khan","year":"2017","unstructured":"Khan, W., Kuru, K.: An intelligent system for spoken term detection that uses belief combination. IEEE Intell. Syst. 32, 70\u201379 (2017)","journal-title":"IEEE Intell. Syst."},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17727\/JMSR.2019\/7-1","volume":"07","author":"W Khan","year":"2019","unstructured":"Khan, W., Badii, A.: Pathological gait abnormality detection and segmentation by processing the hip joints motion data to support mobile gait rehabilitation. J. Res. Med. Sci. 07, 1\u20139 (2019)","journal-title":"J. Res. Med. Sci."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Khan, W., Hussain, A., Khan, B., Shamsa, T.B., Nawaz, R.: Novel framework for outdoor mobility assistance and auditory display for visually impaired people. In: 12th International Conference on the Developments in eSystems Engineering (DeSE2019: Robotics, Sensors, Data Science and Industry 4.0.) (2019)","DOI":"10.1109\/DeSE.2019.00183"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, J., Crockett, K., Khan, W., Kindynis, P., Antoniades, A., Boultadakis, G.: Intelligent deception detection through machine based interviewing. In: International Joint Conference on Neural Networks (IJCNN) (2018)","DOI":"10.1109\/IJCNN.2018.8489392"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/j.asoc.2017.11.007","volume":"62","author":"K Kuru","year":"2018","unstructured":"Kuru, K., Khan, W.: Novel hybrid object-based non-parametric clustering approach for grouping similar objects in specific visual domains. Appl. Soft Comput.  62, 667\u2013701 (2018)","journal-title":"Appl. Soft Comput."},{"key":"26_CR17","unstructured":"Dilek, S., \u00c7ak\u0131r, H., Ayd\u0131n, M.: Applications of artificial intelligence techniques to combating cyber-crimes: a Review (2015). \nhttps:\/\/arxiv.org\/abs\/1502.03552"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"62296","DOI":"10.1109\/ACCESS.2018.2876595","volume":"06","author":"H Qadir","year":"2018","unstructured":"Qadir, H., Khalid, O., Khan, M.U., Khan, A.U., Nawaz, R.: An optimal ride sharing recommendation framework for carpooling services. IEEE Access 06, 62296\u201362313 (2018). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2876595","journal-title":"IEEE Access"},{"key":"26_CR19","unstructured":"Davis, J.: Phishing Attacks on the Rise, 25% Increase in Threats Evading Security, HealthITSecurity (2019). \nhttps:\/\/healthitsecurity.com\/news\/phishing-attacks-on-the-rise-25-increase-in-threats-evading-security"},{"key":"26_CR20","doi-asserted-by":"publisher","unstructured":"Ibrahim, D., Hadi, A.: Phishing websites prediction using classification techniques. In: International Conference on New Trends in Computing Sciences (ICTCS) (2017). \nhttps:\/\/doi.org\/10.1109\/ictcs.2017.38","DOI":"10.1109\/ictcs.2017.38"},{"key":"26_CR21","unstructured":"Mohammad, R.M., McCluskey, T.L., Thabtah, F.: UCI Machine Learning Repository, Irvine, CA: University of California, School of Information and Computer Science (2012). \nhttps:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing+websites\n\n. Accessed 16 June 2019"},{"key":"26_CR22","unstructured":"Zhang, N., Yuan, Y.: Phishing detection using neural network (2012). \nhttps:\/\/cs229.stanford.edu\/proj2012\/ZhangYuan-PhishingDetectionUsingNeuralNetwork.pdf"},{"key":"26_CR23","unstructured":"Metrics and scoring: quantifying the quality of predictions \u2014 scikit-learn 0.22.1 documentation, Scikit-learn.org.  \nhttps:\/\/scikit-learn.org\/stable\/modules\/model_evaluation.html"},{"issue":"3","key":"26_CR24","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","volume":"8","author":"R Mohammad","year":"2014","unstructured":"Mohammad, R., McCluskey, L., Thabtah, F.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8(3), 153\u2013160 (2014). \nhttps:\/\/doi.org\/10.1049\/iet-ifs.2013.0202","journal-title":"IET Inf. Secur."},{"key":"26_CR25","unstructured":"Karnik, R., Bhandari, D.G.M.: Support vector machine based malware and phishing website detection (2016). \nhttps:\/\/pdfs.semanticscholar.org\/ffea\/603ec9f33931c9de630ba1a6ac71924f1539.pdf?_ga=2.226066713.262761491.1579621617-1102774226.1578838444"},{"issue":"12","key":"26_CR26","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s00500-018-3084-2","volume":"23","author":"M Babagoli","year":"2018","unstructured":"Babagoli, M., Aghababa, M.P., Solouk, V.: Heuristic nonlinear regression strategy for detecting phishing websites. Soft. Comput. 23(12), 4315\u20134327 (2018). \nhttps:\/\/doi.org\/10.1007\/s00500-018-3084-2","journal-title":"Soft. Comput."},{"key":"26_CR27","doi-asserted-by":"publisher","unstructured":"Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from urls (2019). \nhttps:\/\/doi.org\/10.1016\/j.eswa.2018.09.029","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"26_CR28","doi-asserted-by":"publisher","unstructured":"Tahir, M.A.U.H., Asghar, S., Zafar, A., Gillani, S.: A hybrid model to detect phishing sites using supervised learning algorithms (2016).  \nhttps:\/\/doi.org\/10.1109\/CSCI.2016.0214","DOI":"10.1109\/CSCI.2016.0214"},{"key":"26_CR29","doi-asserted-by":"publisher","unstructured":"Chang, H.L., Dong, H.K., LEE, L.J.: Heuristic based approach for phishing site detection using URL features. In: Third International Conference on Advances in Computing, Electronics and Electrical Technology - CEET (2015). \nhttps:\/\/doi.org\/10.15224\/978-1-63248-056-9-84","DOI":"10.15224\/978-1-63248-056-9-84"},{"key":"26_CR30","doi-asserted-by":"publisher","unstructured":"Tan, C.L.: Phishing Dataset for Machine Learning: Feature Evaluation, Mendeley Data, v1 (2018). \nhttps:\/\/doi.org\/10.17632\/h3cgnj8hft.1\n\n. Accessed 16 June 2019","DOI":"10.17632\/h3cgnj8hft.1"},{"key":"26_CR31","unstructured":"Abdelhamid, N.: UCI Machine Learning Repository, Irvine, CA: University of California, School of Information and Computer Science (2016).  \nhttps:\/\/archive.ics.uci.edu\/ml\/datasets\/Website+Phishing\n\n. Accessed 16 June 2019"},{"key":"26_CR32","unstructured":"Scikit-learn: machine learning in Python \u2014 scikit-learn 0.22.1 documentation, Scikit-learn.org. \nhttps:\/\/scikit-learn.org\/stable\/"},{"key":"26_CR33","unstructured":"Home - Keras Documentation, Keras.io. \nhttps:\/\/keras.io\/"},{"key":"26_CR34","unstructured":"NumPy. \nhttps:\/\/numpy.org\/"},{"key":"26_CR35","unstructured":"Python Data Analysis Library, Pandas.pydata.org. \nhttps:\/\/pandas.pydata.org\/\n\n."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60796-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:17:01Z","timestamp":1602746221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60796-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030607951","9783030607968"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60796-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2020\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}