{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:07Z","timestamp":1742914267217,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031079689"},{"type":"electronic","value":"9783031079696"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07969-6_7","type":"book-chapter","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:02:29Z","timestamp":1656799349000},"page":"85-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Classification of\u00a0URLs Using N-gram Machine Learning Approach"],"prefix":"10.1007","author":[{"given":"Abdelali","family":"Elkouay","sequence":"first","affiliation":[]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Madani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"issue":"15","key":"7_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.eswa.2016.03.028","volume":"57","author":"A Tripathy","year":"2016","unstructured":"Tripathy, A., Agrawal, A., Rath, S.K.: Classification of sentiment reviews using n-gram machine learning approach. Expert Syst. Appl. 57(15), 117\u2013126 (2016)","journal-title":"Expert Syst. Appl."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117, 345\u2013357 (2019)","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"7_CR3","doi-asserted-by":"publisher","first-page":"2593","DOI":"10.1007\/s12652-018-0736-0","volume":"10","author":"H Abutair","year":"2018","unstructured":"Abutair, H., Belghith, A., AlAhmadi, S.: CBR-PDS: a case-based reasoning phishing detection system. J. Ambient Intell. Hum. Comput. 10(7), 2593\u20132606 (2018). https:\/\/doi.org\/10.1007\/s12652-018-0736-0","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"7_CR4","unstructured":"Ebbu2017 Phishing Dataset. Accessed 1 Apr 2020, https:\/\/github.com\/ebubekirbbr\/pdd\/tree\/master\/input"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2017.02.004","volume":"71","author":"M Volkamer","year":"2017","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B., Kunz, A.: User experiences of torpedo: tooltip-powered phishing email detection. Comput. Secur. 71, 100\u2013113 (2017)","journal-title":"Comput. Secur."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Peng, T., Harris, I., Sawa, Y.: Detecting phishing attacks using natural language processing and machine learning. In: IEEE 12th International Conference on Semantic Computing (ICSC), pp. 300\u2013301 (2018)","DOI":"10.1109\/ICSC.2018.00056"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.dss.2016.05.005","volume":"88","author":"CL Tan","year":"2016","unstructured":"Tan, C.L., et al.: PhishWHO: phishing webpage detection via identity keywords extraction and target domain name finder. Decis. Supp. Syst. 88, 18\u201327 (2016)","journal-title":"Decis. Supp. Syst."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1155\/2018\/7251750","volume":"78","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Choo, J.S.F., Sze, S.N., Yong, K.S.: Leverage website favicon to detect phishing websites. Secur. Commun. Netw. 78, 95 (2018). https:\/\/doi.org\/10.1155\/2018\/7251750","journal-title":"Secur. Commun. Netw."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew, K.L., Tan, C.L., Wong, K., Yong, K.S., Tiong, W.K.: A new hybrid ensemble feature selection framework for machine learning based phishing detection system. Inf. Sci. 484, 153\u2013166 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.01.064","journal-title":"Inf. Sci."},{"issue":"6","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1783","DOI":"10.1007\/s12652-017-0616-z","volume":"9","author":"AK Jain","year":"2017","unstructured":"Jain, A.K., Gupta, B.B.: Two-level authentication approach to protect from phishing attacks in real time. J. Ambient Intell. Hum. Computi. 9(6), 1783\u20131796 (2017). https:\/\/doi.org\/10.1007\/s12652-017-0616-z","journal-title":"J. Ambient Intell. Hum. Computi."},{"issue":"5","key":"7_CR11","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"AK Jain","year":"2018","unstructured":"Jain, A.K., Gupta, B.B.: A machine learning based approach for phishing detection using hyperlinks information. J. Ambient Intell. Hum. Computi. 10(5), 2015\u20132028 (2018). https:\/\/doi.org\/10.1007\/s12652-018-0798-z","journal-title":"J. Ambient Intell. Hum. Computi."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 323\u2013333. IEEE (2016)","DOI":"10.1109\/ICDCS.2016.10"},{"issue":"10","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TC.2017.2703808","volume":"66","author":"S Marchal","year":"2017","unstructured":"Marchal, S., Armano, G., Gr\u00f6ndahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-Hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66(10), 1717\u20131733 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231\u2013242 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2016.01.028","journal-title":"Expert Syst. Appl."},{"key":"7_CR15","unstructured":"Shirazi, H., Bezawada, B., Ray, I.: Know thy doma1n name: unbiased phishing detection using domain name based features. In: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, pp. 69\u201375. ACM (2018)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.dss.2016.05.005","volume":"88","author":"CL Tan","year":"2016","unstructured":"Tan, C.L., Chiew, K.L., Wong, K., Sze, S.N.: Phishwho: phishing webpage detection via identity keywords extraction and target domain name finder. Decis. Support Syst. 88, 18\u201327 (2016). https:\/\/doi.org\/10.1016\/j.dss.2016.05.005","journal-title":"Decis. Support Syst."},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.08.003","volume":"62","author":"G Varshney","year":"2016","unstructured":"Varshney, G., Misra, M., Atrey, P.K.: A phish detector using lightweight search features. Comput. Secur. 62, 213\u2013228 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.08.003","journal-title":"Comput. Secur."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the ACM Workshop on Rapid Malcode (WORM), Alexandria, VA (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"7_CR19","unstructured":"Wang, W., Shirley, K.: Breaking bad: detecting malicious domains using word segmentation. arXiv preprint arXiv:1506.04111 (2015)"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Feng, F., Zhou, Q., Shen, Z., Yang, X., Han, L., Wang, J.Q.: The application of a novel neural network in the detection of phishing websites. J. Ambient Intell. Hum. Comput. (5), 1\u201315 (2018). https:\/\/doi.org\/10.1007\/s12652-018-0786-3","DOI":"10.1007\/s12652-018-0786-3"},{"issue":"8","key":"7_CR21","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"RS Rao","year":"2018","unstructured":"Rao, R.S., Pais, A.R.: Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. 31(8), 3851\u20133873 (2018). https:\/\/doi.org\/10.1007\/s00521-017-3305-0","journal-title":"Neural Comput. Appl."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 5th International Conference on Big Data and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07969-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:03:37Z","timestamp":1656799417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07969-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031079689","9783031079696"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07969-6_7","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Big Data and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammed V University in Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bdiot2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.amers.org\/bdiot21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}