{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:13:08Z","timestamp":1742933588110,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031337420"},{"type":"electronic","value":"9783031337437"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33743-7_42","type":"book-chapter","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:02:19Z","timestamp":1685106139000},"page":"513-522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Phishing Websites Based on Machine Learning Techniques"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Veach","sequence":"first","affiliation":[]},{"given":"Munther","family":"Abualkibash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.34010\/injiiscom.v3i2.8805","volume":"3","author":"A Veach","year":"2022","unstructured":"Veach, A., Abualkibash, M.: Phishing website detection using several machine learning algorithms: a review paper. INJIISCOM 3(2), 75\u201386 (2022)","journal-title":"INJIISCOM"},{"key":"42_CR2","doi-asserted-by":"publisher","unstructured":"Janet, B., Nikam, A., Kumar R, J.A.: Real time malicious URL detection on twitch using machine learning. In: 2022 International Conference on Electronics and Renewable Systems (ICEARS) (2022). https:\/\/doi.org\/10.1109\/icears53579.2022.9751862","DOI":"10.1109\/icears53579.2022.9751862"},{"issue":"2","key":"42_CR3","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s12652-019-01311-4","volume":"11","author":"RS Rao","year":"2019","unstructured":"Rao, R.S., Vaishnavi, T., Pais, A.R.: CatchPhish: detection of phishing websites by inspecting URLs. J. Ambient. Intell. Humaniz. Comput. 11(2), 813\u2013825 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01311-4","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"12","key":"42_CR4","doi-asserted-by":"publisher","first-page":"10459","DOI":"10.1007\/s13369-020-04802-1","volume":"45","author":"YA Alsariera","year":"2020","unstructured":"Alsariera, Y.A., Elijah, A.V., Balogun, A.O.: Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations. Arab. J. Sci. Eng. 45(12), 10459\u201310470 (2020). https:\/\/doi.org\/10.1007\/s13369-020-04802-1","journal-title":"Arab. J. Sci. Eng."},{"issue":"10","key":"42_CR5","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.3390\/sym12101681","volume":"12","author":"J-L Chen","year":"2020","unstructured":"Chen, J.-L., Ma, Y.-W., Huang, K.-L.: Intelligent visual similarity-based phishing websites detection. Symmetry 12(10), 1681 (2020). https:\/\/doi.org\/10.3390\/sym12101681","journal-title":"Symmetry"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"42949","DOI":"10.1109\/ACCESS.2022.3168681","volume":"10","author":"M S\u00e1nchez-Paniagua","year":"2022","unstructured":"S\u00e1nchez-Paniagua, M., Fern\u00e1ndez, E.F., Alegre, E., Al-Nabki, W., Gonz\u00e1lez-Castro, V.: Phishing URL detection: a real-case scenario through login URLs. IEEE Access 10, 42949\u201342960 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3168681","journal-title":"IEEE Access"},{"key":"42_CR7","doi-asserted-by":"publisher","first-page":"73271","DOI":"10.1109\/ACCESS.2019.2920655","volume":"7","author":"E Zhu","year":"2019","unstructured":"Zhu, E., Chen, Y., Ye, C., Li, X., Liu, F.: OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7, 73271\u201373284 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2920655","journal-title":"IEEE Access"},{"key":"42_CR8","unstructured":"Veach, A., Abualkibash, M.: ACR23. GitHub (2023). https:\/\/github.com\/Aveach1\/ACR23"},{"key":"42_CR9","unstructured":"Aung, E., Yamana, H.: PhishDataset. GitHub (2022). https:\/\/github.com\/ESDAUNG\/PhishDataset. Accessed 11 Jan 2023"},{"key":"42_CR10","unstructured":"Google: Yggdrasil Decision Forest. GitHub. https:\/\/github.com\/google\/yggdrasil-decision-forests\/tree\/main\/yggdrasil_decision_forests\/port\/javascript\/example. Accessed 8 Jan 2023"},{"key":"42_CR11","unstructured":"Chrome Developers, Google: Manifest V3. https:\/\/developer.chrome.com\/docs\/extensions\/mv3\/intro\/. Accessed 5 Jan 2023"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 2023 International Conference on Advances in Computing Research (ACR\u201923)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33743-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T05:13:40Z","timestamp":1729487620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33743-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031337420","9783031337437"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33743-7_42","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR23\/call_papers.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}