{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:33:49Z","timestamp":1743071629369,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031831164"},{"type":"electronic","value":"9783031831171"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-83117-1_21","type":"book-chapter","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:18:29Z","timestamp":1740597509000},"page":"217-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Intelligence Applied to Counterfeit Websites Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0171-8311","authenticated-orcid":false,"given":"Mohammad","family":"Ghattas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1603-9105","authenticated-orcid":false,"given":"Antonio","family":"Mora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4186-8327","authenticated-orcid":false,"given":"Suhail","family":"Odeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1980-2778","authenticated-orcid":false,"given":"Mahmoud","family":"Obaid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,27]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1080\/17517575.2021.1896786","volume":"16","author":"AK Jain","year":"2022","unstructured":"Jain, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst. 16, 527\u2013565 (2022). https:\/\/doi.org\/10.1080\/17517575.2021.1896786","journal-title":"Enterp. Inf. Syst."},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Qabajeh, I., Thabtah, F., Chiclana, F.: A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Comput. Sci. Rev. 29, 44\u201355 (2018). https:\/\/doi.org\/10.1016\/j.cosrev.2018.05.003","DOI":"10.1016\/j.cosrev.2018.05.003"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Bu, Y., Chen, B., Zhang, S., Lu, X.: Research on phishing webpage detection technology based on CNN-BiLSTM algorithm. In: Journal of Physics: Conference Series, p. 012131. IOP Publishing (2021)","DOI":"10.1088\/1742-6596\/1738\/1\/012131"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Bhavani, P.A., Chalamala, M., Likhitha, P.S., Sai, C.P.S.: Phishing Websites Detection Using Machine Learning (2022). https:\/\/papers.ssrn.com\/abstract=4208185. https:\/\/doi.org\/10.2139\/ssrn.4208185","DOI":"10.2139\/ssrn.4208185"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Gandotra, E., Gupta, D.: An efficient approach for phishing detection using machine learning. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds.) Multimedia Security, pp. 239\u2013253. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-8711-5_12","DOI":"10.1007\/978-981-15-8711-5_12"},{"key":"21_CR6","first-page":"1","volume":"2020","author":"S Wang","year":"2020","unstructured":"Wang, S., Khan, S., Xu, C., Nazir, S., Hafeez, A.: Deep learning-based efficient model development for phishing detection using random forest and BLSTM classifiers. Complexity 2020, 1\u20137 (2020)","journal-title":"Complexity"},{"key":"21_CR7","first-page":"120","volume":"10","author":"DM Vargheese","year":"2022","unstructured":"Vargheese, D.M., Sreelakshmi, N.R.: Phishing website detection using machine learning techniques and CNN. Int. J. Eng. Res. Technol. 10, 120\u2013123 (2022)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"21_CR8","unstructured":"Siddhartha, M.: Malicious URLs Dataset"},{"key":"21_CR9","first-page":"590","volume":"35","author":"A Safi","year":"2023","unstructured":"Safi, A., Singh, S.: A systematic literature review on phishing website detection techniques. J. King Saud Univ.-Comput. Inf. Sci. 35, 590\u2013611 (2023)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Al-Hamar, Y., Kolivand, H., Al-Hamar, A.: Phishing attacks in Qatar: a literature review of the problems and solutions. In: 2019 12th International Conference on Developments in eSystems Engineering (DeSE), pp. 837\u2013842. IEEE (2019)","DOI":"10.1109\/DeSE.2019.00155"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"9733","DOI":"10.3390\/app11209733","volume":"11","author":"B Guo","year":"2021","unstructured":"Guo, B., Zhang, Y., Xu, C., Shi, F., Li, Y., Zhang, M.: HinPhish: an effective phishing detection approach based on heterogeneous information networks. Appl. Sci. 11, 9733 (2021)","journal-title":"Appl. Sci."},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"34677","DOI":"10.1007\/s11042-021-10678-6","volume":"81","author":"M Sabahno","year":"2022","unstructured":"Sabahno, M., Safara, F.: ISHO: improved spotted hyena optimization algorithm for phishing website detection. Multimed Tools Appl. 81, 34677\u201334696 (2022). https:\/\/doi.org\/10.1007\/s11042-021-10678-6","journal-title":"Multimed Tools Appl."}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence \u2013 Software and Applications \u2013 15th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-83117-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:18:36Z","timestamp":1740597516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-83117-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031831164","9783031831171"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-83117-1_21","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"27 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}