{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:15:05Z","timestamp":1774880105710,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319763507","type":"print"},{"value":"9783319763514","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76351-4_30","type":"book-chapter","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T06:23:04Z","timestamp":1521094984000},"page":"294-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Content Based Fraudulent Website Detection Using Supervised Machine Learning Techniques"],"prefix":"10.1007","author":[{"given":"Mahdi","family":"Maktabar","sequence":"first","affiliation":[]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[]},{"given":"Mohd Aizaini","family":"Maarof","sequence":"additional","affiliation":[]},{"given":"Mohamad Nizam","family":"Kassim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Perner, P.: Advances in Data Mining: Applications and Theoretical Aspects. In: Proceedings of 10th Industrial Conference, ICDM 2010, 12\u201314 July 2010, vol. 6171. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14400-4"},{"issue":"10","key":"30_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2009.306","volume":"42","author":"A Abbasi","year":"2009","unstructured":"Abbasi, A., Chen, H.: A comparison of tools for detecting fake websites. Computer 42(10), 78\u201386 (2009)","journal-title":"Computer"},{"key":"30_CR3","unstructured":"Abbasi, A., Chen, H.: Detecting fake escrow websites using rich fraud cues and kernel based methods. In: Annual Workshop on Information Technologies and Systems, pp. 1\u20136 (2007)"},{"key":"30_CR4","first-page":"1","volume":"17","author":"RM Mohammad","year":"2015","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Tutorial and critical analysis of phishing websites methods. Sci. Rev. 17, 1\u201324 (2015)","journal-title":"Sci. Rev."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. In: 2010 International Conference on Intelligent Computation Technology and Automation, ICICTA 2010, vol. 1, pp. 50\u201353 (2010)","DOI":"10.1109\/ICICTA.2010.831"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Le, A. and Markopoulou, A.: PhishDef: url names say it all. In: INFOCOM Proceedings IEEE, pp. 191\u2013195 (2010)","DOI":"10.1109\/INFCOM.2011.5934995"},{"issue":"3","key":"30_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.2307\/25750686","volume":"34","author":"A Abbasi","year":"2010","unstructured":"Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., Nunamaker Jr., J.F.: Detecting fake websites: the contribution of statistical learning theory. MIS Q. 34(3), 435\u2013461 (2010)","journal-title":"MIS Q."},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Martines-romo, J., Araujo, L.: Web spam identification through language model analysis. In: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, pp. 21\u201328 (2009)","DOI":"10.1145\/1531914.1531920"},{"key":"30_CR9","unstructured":"Urvoy, T., Lavergne, T., Filoche, P.: Tracking web spam with hidden style similarity. In: AIRWeb, pp. 25\u201331 (2006)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Hall., B., Najork, M., Manasse, M., Fetterly, D.: Detecting spam web pages through content analysis. In: Proceedings of 15th International Conference on World Wide Web, pp. 83\u201392 (2006)","DOI":"10.1145\/1135777.1135794"},{"key":"30_CR11","unstructured":"Shen, G., Gao, B. Liu, T. Y., Feng, G., Song, S., Li, H.: Detecting link spam using temporal information. In: Proceedings of IEEE International Conference on Data Mining, ICDM, vol. 49, pp. 1049\u20131053 (2006)"},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1326561.1326563","volume":"2","author":"L Becchetti","year":"2007","unstructured":"Becchetti, L., Donato, D., Baeza-yates, R., Leonardi, S.: Link analysis for web spam detection. ACM Trans. Web. 2(1), 1\u201342 (2007)","journal-title":"ACM Trans. Web."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11564096_14","volume-title":"Machine Learning: ECML 2005","author":"Isabel Drost","year":"2005","unstructured":"Drost, I., Scheffer, T.: Thwarting the nigritude ultramarine: learning to identify link spam. In: European Conference on Machine Learning. LNCS(LNAI), vol. 3720, pp. 96\u2013107 (2005)"},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2382438.2382441","volume":"30","author":"A Abbasi","year":"2012","unstructured":"Abbasi, A.: Detecting fake medical web sites using recursive trust labeling. ACM Trans. Inf. Syst. 30(4), 1\u201322 (2012)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2006.23","volume":"10","author":"W Liu","year":"2006","unstructured":"Liu, W., Deng, X., Huang, G., Fu, A.Y.: An antiphishing strategy based on visual similarity assessment. IEEE Internet Comput. 10(2), 58\u201365 (2006)","journal-title":"IEEE Internet Comput."},{"key":"30_CR16","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y. Boneh, D., Mitchell, J.C., Ca, S.: Client-side defense against web-based identity theft. In: NDSS, pp. 1\u201316 (2004)"},{"key":"30_CR17","unstructured":"Abbasi, A., Zhang, Z., Chen., H.: A Statistical Learning Based System for Fake Website Detection, no. 4, pp. 3\u20134 (2008)"},{"key":"30_CR18","volume-title":"Text Mining: A Guidebook for the Social Sciences","author":"G Ignatow","year":"2016","unstructured":"Ignatow, G., Mihalcea, R.: Text Mining: A Guidebook for the Social Sciences. Sage Publication, Los Angeles (2016)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Brill, E.: A simple rule-based part of speech tagger. In: Proceedings of the workshop on Speech and Natural Language 1992, pp. 112\u2013116 (1992)","DOI":"10.3115\/974499.974526"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76351-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T20:17:20Z","timestamp":1751487440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76351-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763507","9783319763514"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76351-4_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"16 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his22017a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}