{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:44:46Z","timestamp":1772822686679,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168474","type":"print"},{"value":"9783032168481","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16848-1_18","type":"book-chapter","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:06:22Z","timestamp":1772802382000},"page":"233-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Predictive Model of Phishing Attacks Using Machine Learning for Fintech Companies in Peru"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1626-2126","authenticated-orcid":false,"given":"Yazm\u00edn","family":"Reyes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3897-5028","authenticated-orcid":false,"given":"Diego","family":"Casallo","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Mansilla","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Escarcena","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Buleje","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Revenkov, P., Oshmankevich, K., Berdyugin, A.: Phishing schemes in the banking sector: recommendations to Internet users on protection and development of regulatory tasks. Finance Theory Pract. 25(6), 212\u2013226 (2021). https:\/\/doi.org\/10.26794\/2587-5671-2021-25-6-212-226","DOI":"10.26794\/2587-5671-2021-25-6-212-226"},{"key":"18_CR2","unstructured":"Ar\u00e9valo, E.: Cyber Kill Chain Ataque y Defensa. Re-Pilo: Especializaci\u00f3n en Seguridad Inform\u00e1tica, 1\u20138 (2023). https:\/\/repository.unipiloto.edu.co\/handle\/20.500.12277\/13079"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Moncada, A.: Comparaci\u00f3n de t\u00e9cnicas de machine learning para detecci\u00f3n de sitios web de phishing. Interfases 13(013), 77\u2013103 (2020). https:\/\/doi.org\/10.26439\/interfases2020.n013.4886","DOI":"10.26439\/interfases2020.n013.4886"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/asi5040073","volume":"5","author":"M Dewis","year":"2022","unstructured":"Dewis, M., Viana, T.: Phish responder: a hybrid machine learning approach to detect phishing and spam emails. Appl. Syst. Innov. 5(4), 73 (2022). https:\/\/doi.org\/10.3390\/asi5040073","journal-title":"Appl. Syst. Innov."},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s40747-022-00760-3","volume":"9","author":"U Ahmed","year":"2023","unstructured":"Ahmed, U., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., Ahmadian, A.: Cloud-based email phishing attack using machine and deep learning algorithm. Complex Intell. Syst. 9(3), 3043\u20133070 (2023). https:\/\/doi.org\/10.1007\/s40747-022-00760-3","journal-title":"Complex Intell. Syst."},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1108\/JEIM-01-2020-0036","volume":"36","author":"M Adebowale","year":"2023","unstructured":"Adebowale, M., Lwin, K., Hossain, M.: Intelligent phishing detection scheme using deep learning algorithms. J. Enterp. Inf. Manag. 36(3), 747\u2013766 (2023). https:\/\/doi.org\/10.1108\/JEIM-01-2020-0036","journal-title":"J. Enterp. Inf. Manag."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TBDATA.2020.2978915","volume":"8","author":"Q Li","year":"2022","unstructured":"Li, Q., Cheng, M., Wang, J., Sun, B.: LSTM based phishing detection for big email data. IEEE Trans. Big Data 8, 278\u2013288 (2022). https:\/\/doi.org\/10.1109\/TBDATA.2020.2978915","journal-title":"IEEE Trans. Big Data"},{"issue":"13","key":"18_CR8","doi-asserted-by":"publisher","first-page":"7429","DOI":"10.3390\/app13137429","volume":"13","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Ma, W., Xu, H., Liu, Y., Yin, P.: A lightweight multi-view learning approach for phishing attack detection using transformer with mixture of experts. Appl. Sci. 13(13), 7429 (2023). https:\/\/doi.org\/10.3390\/app13137429","journal-title":"Appl. Sci."},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"131465","DOI":"10.1109\/ACCESS.2023.3321666","volume":"11","author":"C Iscan","year":"2023","unstructured":"Iscan, C., Kumas, O., Patlar, F., Akbulut, A.: Wallet-based transaction fraud prevention through LightGBM with the focus on minimizing false alarms. IEEE Access 11(1), 131465\u2013131474 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3321666","journal-title":"IEEE Access"},{"key":"18_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109374","volume":"118","author":"T Singh","year":"2024","unstructured":"Singh, T., Kumar, M., Kumar, S.: Walkthrough phishing detection techniques. Comput. Electr. Eng. 118, 109374 (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109374","journal-title":"Comput. Electr. Eng."},{"key":"18_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123439","volume":"248","author":"C Nixon","year":"2024","unstructured":"Nixon, C., Sedky, M., Champion, J., Hassan, M.: SALAD: A split active learning based unsupervised network data stream anomaly detection method using autoencoders. Expert Syst. Appl. 248, 123439 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.123439","journal-title":"Expert Syst. Appl."},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Escalona, Y.: Algorithms for table structure recognition. Ingenius 9(2), 50\u201361 (2021). https:\/\/doi.org\/10.17163\/ings.n25.2021.05","DOI":"10.17163\/ings.n25.2021.05"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Saghezchi, F., Mantas, G., Violas, M., De Oliveira, A., Rodriguez, J.: Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 11(4), 602 (2022). https:\/\/doi.org\/10.3390\/electronics11040602","DOI":"10.3390\/electronics11040602"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/s40537-021-00531-w","volume":"8","author":"A Megantara","year":"2021","unstructured":"Megantara, A., Ahmad, T.: A hybrid machine learning method for increasing the performance of network intrusion detection systems. J. Big Data 8, 142 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00531-w","journal-title":"J. Big Data"},{"key":"18_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110423","volume":"247","author":"W Chen","year":"2024","unstructured":"Chen, W., et al.: Network anomaly detection via similarity-aware ensemble learning with ADSIM. Comput. Netw. 247, 110423 (2024). https:\/\/doi.org\/10.1016\/j.comnet.2024.110423","journal-title":"Comput. Netw."},{"key":"18_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2024.110321","volume":"231","author":"H Khani","year":"2024","unstructured":"Khani, H., Elsayed, A., Farag, H., Mohamed, M., Ayad, A.: A cyberattack resilient model for battery electric bus transit fleets using real-time adaptive system information. Electr. Power Syst. Res. 231, 110321 (2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110321","journal-title":"Electr. Power Syst. Res."},{"key":"18_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109282","volume":"117","author":"N Aslam","year":"2024","unstructured":"Aslam, N., Srivastava, S., Gore, M.: DDoS SourceTracer: an intelligent application for DDoS attack mitigation in SDN. Comput. Electr. Eng. 117, 109282 (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109282","journal-title":"Comput. Electr. Eng."},{"key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123445","volume":"249","author":"B Lebichot","year":"2024","unstructured":"Lebichot, B., Siblini, W., Paldino, G., Le Borgne, Y., Obl\u00e9, F., Bontempi, G.: Assessment of catastrophic forgetting in continual credit card fraud detection. Expert Syst. Appl. 249, 123445 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.123445","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"18_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/bdcc8040037","volume":"8","author":"K Strang","year":"2024","unstructured":"Strang, K.: Cybercrime risk found in employee behavior big data using semi-supervised machine learning with personality theories. Big Data Cogn. Comput. 8(4), 37 (2024). https:\/\/doi.org\/10.3390\/bdcc8040037","journal-title":"Big Data Cogn. Comput."},{"issue":"7","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app12073234","volume":"12","author":"A Hernandez","year":"2022","unstructured":"Hernandez, A., et al.: Detecting cryptojacking web threats: an approach with autoencoders and deep dense neural networks. Appl. Sci. 12(7), 1\u201328 (2022). https:\/\/doi.org\/10.3390\/app12073234","journal-title":"Appl. Sci."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"165286","DOI":"10.1109\/ACCESS.2021.3134330","volume":"9","author":"E Ileberi","year":"2021","unstructured":"Ileberi, E., Sun, Y., Wang, Z.: Performance evaluation of machine learning methods for credit card fraud detection using SMOTE and AdaBoost. IEEE Access 9, 165286\u2013165294 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3134330","journal-title":"IEEE Access"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.5267\/j.ijdns.2024.2.005","volume":"8","author":"A Sharabati","year":"2024","unstructured":"Sharabati, A., Rehman, S., Malik, M., Sabra, S., Al-Sager, M., Allahham, M.: Is AI biased? Evidence from FinTech-based innovation in supply chain management companies? Int. J. Data Netw. Sci. 8, 1839\u20131852 (2024). https:\/\/doi.org\/10.5267\/j.ijdns.2024.2.005","journal-title":"Int. J. Data Netw. Sci."},{"key":"18_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2024.102683","volume":"12","author":"A Patil","year":"2024","unstructured":"Patil, A., Mahajan, S., Menpara, J., Wagle, S., Pareek, P., Kotecha, K.: Enhancing fraud detection in banking by integration of graph databases with machine learning. MethodsX 12, 102683 (2024). https:\/\/doi.org\/10.1016\/j.mex.2024.102683","journal-title":"MethodsX"},{"issue":"23","key":"18_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22239461","volume":"22","author":"B Stojanovi\u0107","year":"2022","unstructured":"Stojanovi\u0107, B., Bo\u017ei\u0107, J.: Robust financial fraud alerting system based in the cloud environment. Sensor 22(23), 1\u201320 (2022). https:\/\/doi.org\/10.3390\/s22239461","journal-title":"Sensor"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Morales, V., Arag\u00f3n, G., Arango, F.: La popularidad de las marcas y su valor econ\u00f3mico en el marco de las finanzas corporativas: un an\u00e1lisis de aprendizaje m\u00e1quina. Contadur\u00eda y Administraci\u00f3n 68, 289\u2013323 (2023). https:\/\/doi.org\/10.22201\/fca.24488410e.2023.4665","DOI":"10.22201\/fca.24488410e.2023.4665"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1852447","volume":"2022","author":"H Wang","year":"2022","unstructured":"Wang, H., Chen, X., Du, J., Lai, K.: Classification of FinTech patents by machine learning and deep learning reveals trends of FinTech development in China. Math. Probl. Eng. 2022, 1\u201315 (2022). https:\/\/doi.org\/10.1155\/2022\/1852447","journal-title":"Math. Probl. Eng."},{"key":"18_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconbus.2023.106126","volume":"125\u2013126","author":"G Babaei","year":"2023","unstructured":"Babaei, G., Giudici, P., Raffinetti, E.: Explainable FinTech lending. J. Econ. Bus. 125\u2013126, 106126 (2023). https:\/\/doi.org\/10.1016\/j.jeconbus.2023.106126","journal-title":"J. Econ. Bus."},{"key":"18_CR28","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1186\/s40854-024-00625-3","volume":"10","author":"A Blanco","year":"2024","unstructured":"Blanco, A., Lara, J., Irimia, A., Li\u00e9bana, F.: Examining user behavior with machine learning for effective mobile peer-to-peer payment adoption. Financ. Innov. 10, 94 (2024). https:\/\/doi.org\/10.1186\/s40854-024-00625-3","journal-title":"Financ. Innov."},{"issue":"24","key":"18_CR29","doi-asserted-by":"publisher","first-page":"13591","DOI":"10.3390\/su132413591","volume":"13","author":"M Al-Okaily","year":"2021","unstructured":"Al-Okaily, M., Al-Natour, A., Shishan, F., Al-Dmour, A., Alghazzawi, R., Alsharairi, M.: Sustainable FinTech innovation orientation: a moderated model. Sustainability 13(24), 13591 (2021). https:\/\/doi.org\/10.3390\/su132413591","journal-title":"Sustainability"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"3429","DOI":"10.3390\/electronics12163429","volume":"12","author":"I Katib","year":"2023","unstructured":"Katib, I., Assiri, F., Althaqafi, T., AlKubaisy, Z., Hamed, D., Ragab, M.: Hybrid hunter-prey optimization with deep learning-based fintech for predicting financial crises in the economy and society. Electronics 12, 3429 (2023). https:\/\/doi.org\/10.3390\/electronics12163429","journal-title":"Electronics"},{"key":"18_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124896","volume":"2565","author":"F Hendaoui","year":"2024","unstructured":"Hendaoui, F., Hendaoui, S.: SENTINEY: securing ENcrypted mulTI-party computatIoN for enhanced data privacy and phishing detection. Expert Syst. Appl. 2565, 124896 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.124896","journal-title":"Expert Syst. Appl."},{"key":"18_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124941","volume":"2565","author":"M Tang","year":"2024","unstructured":"Tang, M., Ye, M., Chen, W., Zhou, D.: BiLSTM4DPS: an attention-based BiLSTM approach for detecting phishing scams in ethereum. Expert Syst. Appl. 2565, 124941 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.124941","journal-title":"Expert Syst. Appl."},{"key":"18_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109625","volume":"120","author":"A Al-Subaiey","year":"2024","unstructured":"Al-Subaiey, A., Al-Thani, M., Abdullah, N., Antora, K., Khandakar, A., Ashfaq, S.: Novel interpretable and robust web-based AI platform for phishing email detection. Comput. Electr. Eng. 120, 109625 (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109625","journal-title":"Comput. Electr. Eng."},{"issue":"7","key":"18_CR34","doi-asserted-by":"publisher","first-page":"3764","DOI":"10.3390\/app15073764","volume":"15","author":"S Park","year":"2025","unstructured":"Park, S., Oh, S., Park, W.: Automated classification model for elementary mathematics diagnostic assessment data based on TF-IDF and XGBoost. Appl. Sci. 15(7), 3764 (2025). https:\/\/doi.org\/10.3390\/app15073764","journal-title":"Appl. Sci."},{"key":"18_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2024.100254","volume":"7","author":"S Hakkal","year":"2024","unstructured":"Hakkal, S., Lahcen, A.: XGBoost to enhance learner performance prediction. Comput. Educ. Artif. Intell. 7, 100254 (2024). https:\/\/doi.org\/10.1016\/j.caeai.2024.100254","journal-title":"Comput. Educ. Artif. Intell."}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16848-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:06:23Z","timestamp":1772802383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16848-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168474","9783032168481"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16848-1_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cartagena de Indias","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}