{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:58:58Z","timestamp":1772301538992,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319121598","type":"print"},{"value":"9783319121604","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12160-4_27","type":"book-chapter","created":{"date-parts":[[2014,10,18]],"date-time":"2014-10-18T11:14:47Z","timestamp":1413630887000},"page":"455-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Semantic Feature Selection for Text with Application to Phishing Email Detection"],"prefix":"10.1007","author":[{"given":"Rakesh","family":"Verma","sequence":"first","affiliation":[]},{"given":"Nabil","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,19]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Irani, D., Webb, S., Giffin, J., Pu, C.: Evolutionary study of phishing. In: 3rd Anti-Phishing Working Group eCrime Researchers Summit (2008)","DOI":"10.1109\/ECRIME.2008.4696967"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Yu, W., Nargundkar, S., Tiruthani, N.: Phishcatch - a phishing detection tool. In: 33rd IEEE International Computer Software and Applications Conference, pp. 451\u2013456 (2009)","DOI":"10.1109\/COMPSAC.2009.175"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1007\/978-3-642-33167-1_47","volume-title":"Computer Security \u2013 ESORICS 2012","author":"R Verma","year":"2012","unstructured":"Verma, R., Shashidhar, N., Hossain, N.: Detecting phishing emails the natural language way. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 824\u2013841. Springer, Heidelberg (2012)"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2012-1","volume":"2012","author":"V Ramanathan","year":"2012","unstructured":"Ramanathan, V., Wechsler, H.: Phishgillnet - phishing detection using probabilistic latent semantic analysis. EURASIP J. Inf. Secur. 2012, 1 (2012)","journal-title":"EURASIP J. Inf. Secur."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Li, S., Xia, R., Zong, C., Huang, C.R.: A framework of feature selection methods for text categorization. In: ACL\/AFNLP, pp. 692\u2013700 (2009)","DOI":"10.3115\/1690219.1690243"},{"key":"27_CR6","unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: ICML, pp. 412\u2013420 (1997)"},{"issue":"2\/3","key":"27_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007692713085","volume":"39","author":"K Nigam","year":"2000","unstructured":"Nigam, K., McCallum, A., Thrun, S., Mitchell, T.M.: Text classification from labeled and unlabeled documents using EM. Mach. Learn. 39(2\/3), 103\u2013134 (2000)","journal-title":"Mach. Learn."},{"key":"27_CR8","first-page":"1289","volume":"3","author":"G Forman","year":"2003","unstructured":"Forman, G.: An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3, 1289\u20131305 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"key":"27_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-01244-0_2","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"A Herzberg","year":"2009","unstructured":"Herzberg, A.: Combining authentication, reputation and classification to make phishing unprofitable. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 13\u201324. Springer, Heidelberg (2009)"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M Porter","year":"1980","unstructured":"Porter, M.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"27_CR12","volume-title":"WordNet an Electronic Lexical Database","year":"1998","unstructured":"Fellbaum, C. (ed.): WordNet an Electronic Lexical Database. MIT Press, Cambridge (1998)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Richens, T.: Anomalies in the WordNet verb hierarchy. In: COLING, pp. 729\u2013736 (2008)","DOI":"10.3115\/1599081.1599173"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Csomai, A.: Senselearner: word sense disambiguation for all words in unrestricted text. In: ACL (2005)","DOI":"10.3115\/1225753.1225767"},{"key":"27_CR15","unstructured":"Nazario, J.: The online phishing corpus (2004). http:\/\/monkey.org\/~jose\/wiki\/doku.php"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th International Conference on World Wide Web, ACM, pp. 649\u2013656 (2007)","DOI":"10.1145\/1242572.1242660"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-73614-1_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C Ludl","year":"2007","unstructured":"Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 20\u201339. Springer, Heidelberg (2007)"},{"key":"27_CR18","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Proceedings of the 6th Conference on Email and Anti-Spam (2009)"},{"key":"27_CR19","unstructured":"Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing email detection based on structural properties. In: NYS CyberSecurity Conference (2006)"},{"key":"27_CR20","unstructured":"Bergholz, A., Chang, J., Paa\u00df, G., Reichartz, F., Strobel, S.: Improved phishing detection using model-based features. In: Proceedings of the Conference on Email and Anti-Spam (CEAS) (2008)"},{"key":"27_CR21","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-540-77465-5_19","volume-title":"Soft Computing Applications in Industry","author":"R Basnet","year":"2008","unstructured":"Basnet, R., Mukkamala, S., Sung, A.: Detection of phishing attacks: a machine learning approach. In: Prasad, B. (ed.) Soft Computing Applications in Industry. Studies in Fuzziness and Soft Computing, vol. 226, pp. 373\u2013383. Springer, Heidelberg (2008)"},{"issue":"1","key":"27_CR22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3233\/JCS-2010-0371","volume":"18","author":"A Bergholz","year":"2010","unstructured":"Bergholz, A., Beer, J.D., Glahn, S., Moens, M.F., Paa\u00df, G., Strobel, S.: New filtering approaches for phishing email. J. Comput. Secur. 18(1), 7\u201335 (2010)","journal-title":"J. Comput. Secur."},{"key":"27_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-00958-7_40","volume-title":"Advances in Information Retrieval","author":"WN Gansterer","year":"2009","unstructured":"Gansterer, W.N., P\u00f6lz, D.: E-mail classification for phishing defense. In: Boughanem, M., Berrut, C., Mothe, J., Soule-Dupuy, C. (eds.) ECIR 2009. LNCS, vol. 5478, pp. 449\u2013460. Springer, Heidelberg (2009)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-Phishing Working Group\u2019s 2nd Annual eCrime Researchers Summit, ACM, pp. 60\u201369 (2007)","DOI":"10.1145\/1299015.1299021"},{"issue":"1","key":"27_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1002\/sec.45","volume":"2","author":"DL Cook","year":"2009","unstructured":"Cook, D.L., Gurbani, V.K., Daniluk, M.: Phishwish: a simple and stateless phishing filter. Secur. Commun. Netw. 2(1), 29\u201343 (2009)","journal-title":"Secur. Commun. Netw."},{"key":"27_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/0470086106","volume-title":"Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft","author":"M Jakobsson","year":"2006","unstructured":"Jakobsson, M., Myers, S.: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience, Hoboken (2006)"},{"key":"27_CR27","volume-title":"Phishing Exposed","author":"L James","year":"2005","unstructured":"James, L.: Phishing Exposed. Syngress Publishing, Rockland (2005)"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Ollmann, G.: The phishing guide. Next Generation Security Software Ltd. (2004)","DOI":"10.1016\/S1353-4858(04)00050-9"},{"key":"27_CR29","volume-title":"Implementing Email and Security Tokens: Current Standards, Tools, and Practices","author":"S Turner","year":"2008","unstructured":"Turner, S., Housley, R.: Implementing Email and Security Tokens: Current Standards, Tools, and Practices. Wiley, Hoboken (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology -- ICISC 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12160-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T06:21:02Z","timestamp":1746426062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12160-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319121598","9783319121604"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12160-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}