{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:03:16Z","timestamp":1746158596196,"version":"3.40.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319037554"},{"type":"electronic","value":"9783319037561"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03756-1_50","type":"book-chapter","created":{"date-parts":[[2013,12,12]],"date-time":"2013-12-12T19:21:04Z","timestamp":1386876064000},"page":"559-573","source":"Crossref","is-referenced-by-count":9,"title":["Text and Data Mining to Detect Phishing Websites and Spam Emails"],"prefix":"10.1007","author":[{"given":"Mayank","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Vadlamani","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"Abi-Haidar, A., Rocha, L.M.: Adaptive Spam Detection Inspired by the Immune System. In: Bullock, S., Noble, J., Watson, R.A., Bedau, M.A. (eds.) Artificial Life XI: Eleventh International Conference on the Simulation and Synthesis of Living Systems, pp. 1\u20138. MIT Press (2008)"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishingdetection. In: Proceedings of the APWG Ecrime Researchers Summit, Pittsburgh, USA (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"50_CR3","unstructured":"Afroz, S., Greenstadt, R.: PhishZoo: An automated web phishing detection approach based on profiling and fuzzy matching, Technical Report DU-CS-09-03, Department of Computer Science, Drexel University, Pennsylvania, USA (2009)"},{"issue":"7","key":"50_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.3844\/jcssp.2012.1099.1107","volume":"8","author":"A. ALmomani","year":"2012","unstructured":"ALmomani, A., Wan, T.-C., Altaher, A., Manasrah, A., Eman, A., Anbar, M., Esraa, A., Ramadass, S.: Evolving fuzzy neural network for phishing emails detection. Journal of Computer Science\u00a08(7), 1099\u20131107 (2012)","journal-title":"Journal of Computer Science"},{"key":"50_CR5","series-title":"STUDFUZZ","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-540-77465-5_19","volume-title":"Soft Computing Applications in Industry","author":"R. Basnet","year":"2008","unstructured":"Basnet, R., Mukkamala, S., Sung, A.H.: Detection of phishing attacks: A machine learning approach. In: Prasad, B. (ed.) Soft Computing Applications in Industry. STUDFUZZ, vol.\u00a0226, pp. 373\u2013383. Springer, Heidelberg (2008)"},{"issue":"4","key":"50_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"P.O. Boykin","year":"2005","unstructured":"Boykin, P.O., Roychowdhury, V.P.: Leveraging Social Networks to Fight Spam. IEEE Computer\u00a038(4), 61\u201368 (2005)","journal-title":"IEEE Computer"},{"key":"50_CR7","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client side defense against Web based Identity Theft. In: Proceedings of 11th Annual Network and Distributed System Security Symposium, San Diego, CA (2004)"},{"issue":"4-5","key":"50_CR8","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.knosys.2004.10.002","volume":"18","author":"S.J. Delany","year":"2005","unstructured":"Delany, S.J., Cunningham, P., Tsymbal, A., Coyle, L.: A case-based technique for tracking concept drift in spam filtering. Knowledge-Based Systems\u00a018(4-5), 187\u2013195 (2005)","journal-title":"Knowledge-Based Systems"},{"key":"50_CR9","unstructured":"Diesner, J., Carley, K.M.: Exploration of Communication Networks from the Enron Email Corpus. In: Proc. of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining, Newport Beach, California, USA (2005)"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Fergus, T., Joe, C.: Phishing detection using Classifier Ensembles, e-Crime Researchers Summit, Tacoma, WA, 1-9 (2009)","DOI":"10.1109\/ECRIME.2009.5342607"},{"key":"50_CR11","first-page":"2699","volume":"7","author":"G. Fumera","year":"2006","unstructured":"Fumera, G., Pillai, I., Roli, F.: Spam Filtering Based on the Analysis of Text Information Embedded into Images. The Journal of Machine Learning Researc\u00a07, 2699\u20132720 (2006)","journal-title":"The Journal of Machine Learning Researc"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"He, M., Horng, S.-J., Fan, P., Khan, M.K., Run, R.-S., Lai, J.-L., Chen, R.-J., Sutanto, A.: An efficient phishing webpage detector. Expert Systems with Applications: An International Journal\u00a038(10) (2011)","DOI":"10.1016\/j.eswa.2011.01.046"},{"key":"50_CR13","unstructured":"Herzberg, A., Gbara, A.: TrustBar: Protecting web users from spoofing and phishing attacks, Cryptology ePrint Archive: Report 2004\/155 (2004)"},{"issue":"1","key":"50_CR14","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.jnca.2012.05.009","volume":"36","author":"R. Islam","year":"2013","unstructured":"Islam, R., Abawajy, J.: A multi-tier phishing detection and filtering approach. J. Network and Computer Applications\u00a036(1), 324\u2013335 (2013)","journal-title":"J. Network and Computer Applications"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Lakshmi, V.S., Vijaya, M.S.: Efficient prediction of phishing websites using supervised learning algorithms. In: International Conference on Communication Technology and System Design, vol.\u00a030, pp. 798\u2013805 (2011)","DOI":"10.1016\/j.proeng.2012.01.930"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Maher, A., Hossain, M.A., Fadi, T., Dahal, K.: Intelligent phishing website detection using fuzzy Techniques. In: 3rd International Conference Information and communication technologies: From theory to applications, ICTTA, Damascus, Syria, pp. 1\u20136 (2008)","DOI":"10.1109\/ICTTA.2008.4530019"},{"issue":"12","key":"50_CR17","doi-asserted-by":"publisher","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","volume":"37","author":"A. Maher","year":"2010","unstructured":"Maher, A., Hossain, M.A., Fadi, T., Dahal, K.: Intelligent phishing Detection System for e-Banking using fuzzy data mining. Expert Systems with Applications\u00a037(12), 7913\u20137921 (2010)","journal-title":"Expert Systems with Applications"},{"key":"50_CR18","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam Filtering with Naive Bayes \u2013 Which Naive Bayes? In: Third Conference on Email and Anti-Spam, Mountain View, California, USA (2006)"},{"key":"50_CR19","first-page":"381","volume-title":"Twenty Second Annual Computer Security Applications Conference","author":"Y. Pan","year":"2006","unstructured":"Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: Twenty Second Annual Computer Security Applications Conference, pp. 381\u2013392. IEEE Computer Society, Washington, DC (2006)"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Pandey, M., Ravi, V.: Detecting Phishing emails using Text and Data mining. In: Proceedings of Internation Conference on Computational Intelligence and Computing Research (ICCIC 2012), Coimbatore, India, pp. 249\u2013254 (2012)","DOI":"10.1109\/ICCIC.2012.6510259"},{"key":"50_CR21","first-page":"659","volume":"4","author":"V. Ravi","year":"2012","unstructured":"Ravi, V., Lal, R., Rajkiran, N.: Foreign exchange rate prediction using Computational Intelligence Methods. International Journal of Computer Science and Industrial Management Applications\u00a04, 659\u2013670 (2012) ISSN 2150-7988","journal-title":"International Journal of Computer Science and Industrial Management Applications"},{"key":"50_CR22","unstructured":"Spira, J.: Spam E-Mail and its Impact on IT Spending and Productivity, Basex Report (2003), http:\/\/www.basex.com\/poty2003.nsfl"},{"key":"50_CR23","unstructured":"The Anti Phishing Working Group, http:\/\/www.antiphishing.org"},{"issue":"3","key":"50_CR24","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.dss.2007.06.010","volume":"45","author":"C.-P. Wei","year":"2008","unstructured":"Wei, C.-P., Chen, H.-C., Cheng, T.-H.: Effective spam filtering: A single-class learning and ensemble approach. Decision Support System\u00a045(3), 491\u2013503 (2008)","journal-title":"Decision Support System"},{"issue":"10","key":"50_CR25","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2004.177","volume":"37","author":"B. Whitworth","year":"2004","unstructured":"Whitworth, B., Whitworth, E.: Spam and the social-technical gap. IEEE Computer\u00a037(10), 38\u201345 (2004)","journal-title":"IEEE Computer"},{"issue":"4","key":"50_CR26","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1039621.1039625","volume":"3","author":"V. Zhang","year":"2004","unstructured":"Zhang, V., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. ACM Transactions on Asian Language Information Processing\u00a03(4), 243\u2013269 (2004)","journal-title":"ACM Transactions on Asian Language Information Processing"},{"key":"50_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J., Cranor, L.: CANTINA: A content-based approach to detecting phishing web sites. In: Proceedings of the international World Wide Web Conference, Banff, Alberta, Canada, May 8-12 (2007)","DOI":"10.1145\/1242572.1242659"},{"key":"50_CR28","unstructured":"Phishtank, http:\/\/www.phishtank.com"},{"key":"50_CR29","unstructured":"PhishingCorpus, http:\/\/monkey.org\/~jose\/wiki\/doku.php?id=PhishingCorpus"},{"key":"50_CR30","unstructured":"SpamAssassin, http:\/\/www.spamassassin.apache.org"},{"key":"50_CR31","unstructured":"Netcraft, http:\/\/toolbar.netcraft.com\/"},{"issue":"1","key":"50_CR32","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1111\/j.1600-065X.2007.00487.x","volume":"216","author":"J. Carneiro","year":"2007","unstructured":"Carneiro, J., Leon, K., Caramalho, \u00cd., van den Dool, C., Gardner, R., Oliveira, V., Berg-man, M., Sep\u00falveda, N., Paix\u00e3o, T., Faro, J.: When three is not a crowd: a Cross regulation Model of the dynamics and repertoire selection of regulatory CD4 T cells. Immuno-logical Reviews\u00a0216(1), 48\u201368 (2007)","journal-title":"Immuno-logical Reviews"},{"key":"50_CR33","unstructured":"Anti Phishing Working Group, http:\/\/www.apwg.com"}],"container-title":["Lecture Notes in Computer Science","Swarm, Evolutionary, and Memetic Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03756-1_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:38:46Z","timestamp":1746074326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03756-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319037554","9783319037561"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03756-1_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}