{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:36:12Z","timestamp":1769312172565,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030711863","type":"print"},{"value":"9783030711870","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71187-0_129","type":"book-chapter","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T05:04:54Z","timestamp":1622610294000},"page":"1394-1403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Real-Time Content-Based Cyber Threat Detection with Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2534-5366","authenticated-orcid":false,"given":"Emre","family":"Kocyigit","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4046-3910","authenticated-orcid":false,"given":"Mehmet","family":"Korkmaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1588-8220","authenticated-orcid":false,"given":"Ozgur Koray","family":"Sahingoz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4052-0049","authenticated-orcid":false,"given":"Banu","family":"Diri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"129_CR1","doi-asserted-by":"crossref","unstructured":"Furnell, S., Millet, K., Papadaki, M.: Fifteen years of phishing: can technology save us? Comput. Fraud Secur. 2019, 11\u201316 (2019)","DOI":"10.1016\/S1361-3723(19)30074-0"},{"issue":"2018","key":"129_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106(2018), 1\u201320 (2018)","journal-title":"Expert Syst. Appl."},{"key":"129_CR3","unstructured":"Clement, J.: Worldwide digital population as of July 2020 (2020). https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/#:~:text=Almost%204.57%20billion%20people%20were,percent%20of%20the%20global%20population"},{"key":"129_CR4","doi-asserted-by":"publisher","first-page":"56329","DOI":"10.1109\/ACCESS.2019.2913705","volume":"7","author":"Y Fang","year":"2019","unstructured":"Fang, Y., Zhang, C., Huang, C., Liu, L., Yang, Y.: Phishing email detection using improved RCNN model with multivel vectors and attention mechanism. IEEE Access 7, 56329\u201356340 (2019)","journal-title":"IEEE Access"},{"key":"129_CR5","doi-asserted-by":"crossref","unstructured":"Somesha, M., Pais, A.R., Rao, R.S., Rathour, V.S.: Efficient deep learning techniques for detection of phishing websites. Sadhana (2020)","DOI":"10.1007\/s12046-020-01392-4"},{"issue":"10","key":"129_CR6","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TNN.2011.2161999","volume":"22","author":"H Zhang","year":"2011","unstructured":"Zhang, H., Liu, G., Chow, T.W.S., Liu, W.: Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Trans. Neural Netw. 22(10), 1532\u20131546 (2011)","journal-title":"IEEE Trans. Neural Netw."},{"key":"129_CR7","doi-asserted-by":"crossref","unstructured":"Buber, E., Diri, B., Sahingoz, O.K.: Detecting phishing attacks from URL by using NLP techniques. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, pp. 337\u2013342 (2017)","DOI":"10.1109\/UBMK.2017.8093406"},{"key":"129_CR8","doi-asserted-by":"crossref","unstructured":"Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from urls. intelligent systems design and applications. In: ISDA 2017. Advances in Intelligent Systems and Computing, vol. 736. Springer (2018)","DOI":"10.1007\/978-3-319-76348-4_59"},{"key":"129_CR9","doi-asserted-by":"crossref","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Abdulhamid, S.M., Adetunmbi, A.O., Ajibuwa, O.E.: Machine learning for email spam filtering: review, approaches and open research problems. In: Heliyon, pp. 1\u201323. ScienceDirect (2019)","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"129_CR10","unstructured":"Phishing Dataset (2017). https:\/\/www.fcsit.unimas.my\/phishing-dataset"},{"key":"129_CR11","doi-asserted-by":"publisher","first-page":"137293","DOI":"10.1109\/ACCESS.2020.3011259","volume":"8","author":"WA Al-Khater","year":"2020","unstructured":"Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S., Khan, M.K.: Comprehensive review of cybercrime detection techniques. IEEE Access 8, 137293\u2013137311 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3011259","journal-title":"IEEE Access"},{"key":"129_CR12","doi-asserted-by":"crossref","unstructured":"Wardman, B., Stallings, T., Warner, G., Skjellum, A.: High-performance content-based phishing attack detection. In: Proceedings of eCrime Researchers Summit, San Diego, CA, USA, November 2011, pp. 1\u2013 9 (2011)","DOI":"10.1109\/eCrime.2011.6151977"},{"key":"129_CR13","doi-asserted-by":"crossref","unstructured":"Phishing Activity Trends Report 4 th Quarter 2019, February 2020. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2019.pdf","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"129_CR14","unstructured":"Phishing Activity Trends Report 2 th Quarter 2020, August 2020. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q2_2020.pdf"},{"key":"129_CR15","doi-asserted-by":"crossref","unstructured":"Sanchez-Paniagua, M., Fidalgo, E., Gonzales-Castro, V., Alegre, E.: Impact of current phishing strategies in machine learning models for phishing detection. In: Advances in Intelligent Systems and Computing, vol. 1267, pp. 87\u201396 (2020)","DOI":"10.1007\/978-3-030-57805-3_9"},{"key":"129_CR16","doi-asserted-by":"crossref","unstructured":"Sahoo, S.R., Gupta, B.B.: Real-time detection of fake account in twitter using machine-learning approach. In: Advances in Computational Intelligence and Communication Technology, vol. 1086, pp. 149\u2013160 (2020)","DOI":"10.1007\/978-981-15-1275-9_13"},{"key":"129_CR17","doi-asserted-by":"crossref","unstructured":"Khoo, E., Zainal, A., Ariffin, N., Kassim, M.N., Maarof, M.A., Bakhtiari, M.: Fraudulent e-commerce website detection using HTML, text and image features. In: Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019), vol. 1182, pp. 177\u2013186 (2019)","DOI":"10.1007\/978-3-030-49345-5_19"},{"key":"129_CR18","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Parashar, S., Katare, P., Sharma, I.: PhishSKaPe: a content based approach to escape phishing attacks. In: Third International Conference on Computing and Network Communications, COCONET 2019. ScienceDirect (2019)","DOI":"10.1016\/j.procs.2020.04.118"},{"key":"129_CR19","doi-asserted-by":"crossref","unstructured":"Buber, E., Demir, O., Sahingoz, O.K.: Feature selections for the machine learning based detection of phishing websites. In: International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, pp. 1\u20135 (2017)","DOI":"10.1109\/IDAP.2017.8090317"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71187-0_129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T05:38:15Z","timestamp":1622612295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-71187-0_129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030711863","9783030711870"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71187-0_129","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}