{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:32:36Z","timestamp":1743049956547,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030732790"},{"type":"electronic","value":"9783030732806"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73280-6_34","type":"book-chapter","created":{"date-parts":[[2021,4,4]],"date-time":"2021-04-04T08:02:28Z","timestamp":1617523348000},"page":"427-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Experimental Study of Machine Learning for Phishing Detection"],"prefix":"10.1007","author":[{"given":"Dumitru-Daniel","family":"Vecliuc","sequence":"first","affiliation":[]},{"given":"Codru\u021b-Georgian","family":"Artene","sequence":"additional","affiliation":[]},{"given":"Marius-Nicolae","family":"Tibeic\u0103","sequence":"additional","affiliation":[]},{"given":"Florin","family":"Leon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,5]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R., Gupta, M.: PhishNet: predictive blacklisting to detect phishing attacks. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","volume":"8","author":"RM Mohammad","year":"2014","unstructured":"Mohammad, R.M., Thabtah, F.A., McCluskey, T.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8, 153\u2013160 (2014)","journal-title":"IET Inf. Secur."},{"key":"34_CR3","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S. URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. arXiv, abs\/1802.03162 (2018)"},{"key":"34_CR4","doi-asserted-by":"publisher","unstructured":"Opara, C., Wei, B., Chen, Y.: HTMLPhish: enabling phishing web page detection by applying deep learning techniques on HTML analysis. In: 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 2020, pp. 1\u20138 (2020). https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207707","DOI":"10.1109\/IJCNN48605.2020.9207707"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","volume":"94","author":"Y Li","year":"2019","unstructured":"Li, Y., Yang, Z., Chen, X., Yuan, H., Liu, W.: A stacking model using URL and HTML features for phishing webpage detection. Future Gener. Comput. Syst. 94, 27\u201339 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"34_CR6","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding, p. 13. arxiv:1810.04805Comment (2018)"},{"key":"34_CR7","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Tian, Z., Shen, C., Chen, H., He, T.: FCOS: Fully Convolutional One-Stage Object Detection. CoRR, abs\/1904.01355 (2019)","DOI":"10.1109\/ICCV.2019.00972"},{"issue":"4","key":"34_CR9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/info10040150","volume":"10","author":"K Kowsari","year":"2019","unstructured":"Kowsari, K., Jafari Meimandi, K., Heidarysafa, M., Mendu, S., Barnes, L., Brown, D.: Text classification algorithms: a survey. Information 10(4), 150 (2019)","journal-title":"Information"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Liu, W., et al.: SSD: Single Shot MultiBox Detector. arXiv, abs\/1512.02325 (2016)","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal Loss for Dense Object Detection. arXiv:1708.02002 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"34_CR12","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: An Incremental Improvement. arXiv, abs\/1804.02767 (2018)"},{"key":"34_CR13","unstructured":"Zhang, X., Zhao, J., Lecun, Y.: Character-level convolutional networks for text classification. In: Advances in Neural Information Processing Systems, Jan 2015, pp. 649\u2013657 (2015)"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1002\/sec.1045","volume":"8","author":"G Geng","year":"2015","unstructured":"Geng, G., Lee, X., Zhang, Y.: Combating phishing attacks via brand identity and authorization features. Security Commun. Netw. 8, 888\u2013898 (2015). https:\/\/doi.org\/10.1002\/sec.1045","journal-title":"Security Commun. Netw."},{"key":"34_CR15","unstructured":"Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/. Accessed 12 Oct 2020"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP 2014, 25\u201329 Oct 2014, Doha, Qatar. A meeting of SIGDAT, a Special Interest Group of the ACL, pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73280-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T14:17:42Z","timestamp":1724768262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73280-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030732790","9783030732806"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73280-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}