{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:21Z","timestamp":1748217621172,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031379390"},{"type":"electronic","value":"9783031379406"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37940-6_43","type":"book-chapter","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:23:00Z","timestamp":1690057380000},"page":"529-542","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Spear Phishing Using Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7987-2440","authenticated-orcid":false,"given":"Aditya Mahesh","family":"Hegde","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5435-366X","authenticated-orcid":false,"given":"S.P. Bharath","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1405-4391","authenticated-orcid":false,"given":"R.","family":"Bhuvantej","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8574-2061","authenticated-orcid":false,"given":"R.","family":"Vyshak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0494-9825","authenticated-orcid":false,"given":"V.","family":"Sarasvathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,23]]},"reference":[{"key":"43_CR1","doi-asserted-by":"publisher","first-page":"142532","DOI":"10.1109\/ACCESS.2020.3013699","volume":"8","author":"YA Alsariera","year":"2020","unstructured":"Alsariera, Y.A., Adeyemo, V.E., Balogun, A.O., Alazzawi, A.K.: AI meta-learners and extra-trees algorithm for the detection of phishing websites. IEEE Access 8, 142532\u2013142542 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3013699","journal-title":"IEEE Access"},{"key":"43_CR2","doi-asserted-by":"publisher","unstructured":"Peng, T., Harris, I., Sawa, Y.: Detecting phishing attacks using natural language processing and machine learning. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC), pp. 300\u2013301 (2018). https:\/\/doi.org\/10.1109\/ICSC.2018.00056","DOI":"10.1109\/ICSC.2018.00056"},{"key":"43_CR3","doi-asserted-by":"publisher","first-page":"80866","DOI":"10.1109\/ACCESS.2021.3084897","volume":"9","author":"J Lee","year":"2021","unstructured":"Lee, J., Lee, Y., Lee, D., Kwon, H., Shin, D.: Classification of attack types and analysis of attack methods for profiling phishing mail attack groups. IEEE Access 9, 80866\u201380872 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3084897","journal-title":"IEEE Access"},{"key":"43_CR4","doi-asserted-by":"publisher","first-page":"221214","DOI":"10.1109\/ACCESS.2020.3043188","volume":"8","author":"J Feng","year":"2020","unstructured":"Feng, J., Zou, L., Ye, O., Han, J.: Web2Vec: phishing webpage detection method based on multidimensional features driven by deep learning. IEEE Access 8, 221214\u2013221224 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3043188","journal-title":"IEEE Access"},{"key":"43_CR5","doi-asserted-by":"publisher","unstructured":"Kunju, M.V., Dainel, E., Anthony, H.C., Bhelwa, S.: Evaluation of phishing techniques based on machine learning. In: International Conference on Intelligent Computing and Control Systems (ICCS), pp. 963\u2013968 (2019). https:\/\/doi.org\/10.1109\/ICCS45141.2019.9065639","DOI":"10.1109\/ICCS45141.2019.9065639"},{"issue":"4","key":"43_CR6","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091\u20132121 (2013). https:\/\/doi.org\/10.1109\/SURV.2013.032213.00009","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"43_CR7","doi-asserted-by":"publisher","unstructured":"Baig, M.S., Ahmed, F., Memon, A.M.: Spear-phishing campaigns: link vulnerability leads to phishing attacks, spear-phishing electronic\/UAV communication-scam targeted. In: 2021 4th International Conference on Computing & Information Sciences (ICCIS), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ICCIS54243.2021.9676394","DOI":"10.1109\/ICCIS54243.2021.9676394"},{"key":"43_CR8","doi-asserted-by":"publisher","first-page":"65703","DOI":"10.1109\/ACCESS.2022.3183083","volume":"10","author":"S Salloum","year":"2022","unstructured":"Salloum, S., Gaber, T., Vadera, S., Shaalan, K.: A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access 10, 65703\u201365727 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3183083","journal-title":"IEEE Access"},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"6421","DOI":"10.1109\/ACCESS.2023.3237798","volume":"11","author":"S Asiri","year":"2023","unstructured":"Asiri, S., Xiao, Y., Alzahrani, S., Li, S., Li, T.: A survey of intelligent detection designs of HTML URL phishing attacks. IEEE Access 11, 6421\u20136443 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3237798","journal-title":"IEEE Access"},{"key":"43_CR10","doi-asserted-by":"publisher","unstructured":"Geng, G.-G., Yan, Z.-W., Zeng, Y., Jin, X.-B.: RRPhish: anti-phishing via mining brand resources request. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, pp. 1\u20132 (2018). https:\/\/doi.org\/10.1109\/ICCE.2018.8326085","DOI":"10.1109\/ICCE.2018.8326085"},{"key":"43_CR11","doi-asserted-by":"publisher","unstructured":"Nathezhtha, T., Sangeetha, D., Vaidehi, V.: WC-PAD: web crawling based phishing attack detection. In: 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888416","DOI":"10.1109\/CCST.2019.8888416"},{"key":"43_CR12","doi-asserted-by":"publisher","unstructured":"Sushma, K., Jayalakshmi, M., Guha, T.: Deep learning for phishing website detection. In: 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, pp. 1-6 (2022). https:\/\/doi.org\/10.1109\/MysuruCon55714.2022.9972621","DOI":"10.1109\/MysuruCon55714.2022.9972621"},{"key":"43_CR13","doi-asserted-by":"publisher","unstructured":"Shah, R.K., Hasan, M.K., Islam, S., Khan, A., Ghazal, T.M., Khan, A.N.: Detect phishing website by fuzzy multi-criteria decision making. In: 2022 1st International Conference on AI in Cybersecurity (ICAIC), Victoria, TX, USA, pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/ICAIC53980.2022.9897036","DOI":"10.1109\/ICAIC53980.2022.9897036"},{"key":"43_CR14","doi-asserted-by":"publisher","unstructured":"Rose, M.A.S.R, Basir, N., Heng, N.F.N.R., Zaizi, N.J.M., Saudi, M.M.: Phishing detection and prevention using chrome extension, 2022 10th International Symposium on Digital Forensics and Security (ISDFS), Istanbul, Turkey, pp. 1-6 (2022). https:\/\/doi.org\/10.1109\/ISDFS55398.2022.9800826","DOI":"10.1109\/ISDFS55398.2022.9800826"},{"key":"43_CR15","doi-asserted-by":"publisher","unstructured":"Ansari, M.F., Panigrahi, A., Jakka, G., Pati, A., Bhattacharya, K.: Prevention of phishing attacks using AI algorithm. In: 2022 2nd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology (ODICON), Bhubaneswar, India, pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/ODICON54453.2022.10010185","DOI":"10.1109\/ODICON54453.2022.10010185"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37940-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:27:03Z","timestamp":1690057623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37940-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031379390","9783031379406"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37940-6_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair & Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"464","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}