{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:13:09Z","timestamp":1725862389876},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319429106"},{"type":"electronic","value":"9783319429113"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42911-3_7","type":"book-chapter","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T00:01:34Z","timestamp":1470700894000},"page":"80-92","source":"Crossref","is-referenced-by-count":0,"title":["Combining RDR-Based Machine Learning Approach and Human Expert Knowledge for Phishing Prediction"],"prefix":"10.1007","author":[{"given":"Hyunsuk","family":"Chung","sequence":"first","affiliation":[]},{"given":"Renjie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Soyeon Caren","family":"Han","sequence":"additional","affiliation":[]},{"given":"Byeong Ho","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,10]]},"reference":[{"key":"7_CR1","unstructured":"Aburrous, M., Khelifi, A.: Phishing detection plug-in toolbar using intelligent Fuzzy-classification mining techniques. In: The International Conference on Soft Computing and Software Engineering [SCSE 2013]. San Francisco State University, San Francisco (2013)"},{"issue":"1","key":"7_CR2","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology (1990)","DOI":"10.1109\/21.97458"},{"issue":"3","key":"7_CR4","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1145\/212094.212114","volume":"27","author":"T Dietterich","year":"1995","unstructured":"Dietterich, T.: Overfitting and undercomputing in machine learning. ACM Comput. Surv. (CSUR) 27(3), 326\u2013327 (1995)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Pham, H.N.A., Triantaphyllou, E.: The impact of overfitting and overgeneralization on the classification accuracy in data mining. In: Soft Computing for Knowledge Discovery and Data Mining, pp. 391\u2013431. Springer (2008)","DOI":"10.1007\/978-0-387-69935-6_16"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","first-page":"292","volume-title":"AI 1988","author":"P Compton","year":"1998","unstructured":"Compton, P., Jansen, R.: Knowledge in context: a strategy for expert system maintenance. In: Barter, C.J., Brooks, M.J. (eds.) AI 1988. LNCS, vol. 406, pp. 292\u2013306. Springer, Heidelberg (1998)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/978-3-642-19400-9_15","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"DQ Nguyen","year":"2011","unstructured":"Nguyen, D.Q., Nguyen, D.Q., Pham, S.B., Pham, D.D.: Ripple down rules for part-of-speech tagging. In: Gelbukh, A.F. (ed.) CICLing 2011, Part I. LNCS, vol. 6608, pp. 190\u2013201. Springer, Heidelberg (2011)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/978-3-540-24581-0_65","volume-title":"AI 2003: Advances in Artificial Intelligence","author":"SB Pham","year":"2003","unstructured":"Pham, S.B., Hoffmann, A.: A new approach for scientific citation classification using cue phrases. In: Gedeon, T(.D., Fung, L.C.C. (eds.) AI 2003. LNCS (LNAI), vol. 2903, pp. 759\u2013771. Springer, Heidelberg (2003)"},{"key":"7_CR9","unstructured":"Mazid, M.M., Ali, S., Tickle, K.S.: Improved C4. 5 algorithm for rule based classification. In: Proceedings of the 9th WSEAS International Conference on Artificial intelligence, knowledge Engineering and Data Bases. World Scientific and Engineering Academy and Society (WSEAS) (2010)"},{"issue":"2","key":"7_CR10","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/69.991727","volume":"14","author":"S Ruggieri","year":"2002","unstructured":"Ruggieri, S.: Efficient C4. 5 [classification algorithm]. IEEE Trans. Knowl. Data Eng. 14(2), 438\u2013444 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Gaines, B.R.: An ounce of knowledge is worth a ton of data: quantitative studies of the trade-off between expertise and data based on statistically well-founded empirical induction. In: ML (1989)","DOI":"10.1016\/B978-1-55860-036-2.50046-1"},{"issue":"4","key":"7_CR12","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/S0020-7373(87)80003-2","volume":"27","author":"J Cendrowska","year":"1987","unstructured":"Cendrowska, J.: PRISM: an algorithm for inducing modular rules. Int. J. Man Mach. Stud. 27(4), 349\u2013370 (1987)","journal-title":"Int. J. Man Mach. Stud."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Joshi, M.V., Kumar, V.: CREDOS: classification using ripple down structure (a case for rare classes). In: SDM. SIAM (2004)","DOI":"10.1137\/1.9781611972740.30"},{"key":"7_CR14","first-page":"5","volume":"1","author":"CL Devasena","year":"2011","unstructured":"Devasena, C.L., et al.: Effectiveness evaluation of rule based classifiers for the classification of iris data set. Bonfring Int. J. Man Mach. Interface 1, 5 (2011)","journal-title":"Bonfring Int. J. Man Mach. Interface"},{"issue":"2","key":"7_CR15","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443\u2013458 (2014). Aug 1","journal-title":"Neural Comput. Appl."},{"issue":"9","key":"7_CR16","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1007\/s00607-013-0336-y","volume":"96","author":"SC Han","year":"2014","unstructured":"Han, S.C., Yoon, H.G., Kang, B.H., Park, S.B.: Using MCRDR based agile approach for expert system development. Computing 96(9), 897\u2013908 (2014). Sep 1","journal-title":"Computing"},{"issue":"19","key":"7_CR17","doi-asserted-by":"crossref","first-page":"8467","DOI":"10.1007\/s11042-013-1613-7","volume":"74","author":"SC Han","year":"2015","unstructured":"Han, S.C., Mirowski, L., Kang, B.H.: Exploring a role for MCRDR in enhancing telehealth diagnostics. Multimedia Tools Appl. 74(19), 8467\u20138481 (2015). Oct 1","journal-title":"Multimedia Tools Appl."}],"container-title":["Lecture Notes in Computer Science","PRICAI 2016: Trends in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42911-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T09:12:36Z","timestamp":1657012356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42911-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319429106","9783319429113"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42911-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}