{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:14:11Z","timestamp":1751688851508,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319938028"},{"type":"electronic","value":"9783319938035"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93803-5_39","type":"book-chapter","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T18:33:58Z","timestamp":1528569238000},"page":"414-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Self-training Method for Detection of Phishing Websites"],"prefix":"10.1007","author":[{"given":"Xue-peng","family":"Jia","sequence":"first","affiliation":[]},{"given":"Xiao-feng","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"39_CR1","unstructured":"Anti-Phishing Working Group Homepage. http:\/\/www.antiphishing.org\/. Accessed 21 Feb 2018"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 28 June\u2013July 2009, Paris, France, pp. 1245\u20131254 (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S.: Identifying suspicious URLs: an application of large-scale online learning. In: International Conference on Machine Learning (ICML), Montreal, Quebec, June 2009","DOI":"10.1145\/1553374.1553462"},{"issue":"2","key":"39_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang, G., Hong, J., Rose, C.P., et al.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231\u2013242 (2016)","journal-title":"Expert Syst. Appl."},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.dss.2016.05.005","volume":"88","author":"CL Tan","year":"2016","unstructured":"Tan, C.L., Kang, L.C., Wong, K.S.: PhishWHO: phishing webpage detection via identity keywords extraction and target domain name finder. Decis. Support Syst. 88, 18\u201327 (2016)","journal-title":"Decis. Support Syst."},{"issue":"23","key":"39_CR7","doi-asserted-by":"publisher","first-page":"6027","DOI":"10.1016\/j.ijleo.2013.04.078","volume":"124","author":"Y Li","year":"2013","unstructured":"Li, Y., Xiao, R., Feng, J.: A semi-supervised learning approach for detection of phishing webpages. Opt. \u2013 Int. J. Light Electron Opt. 124(23), 6027\u20136033 (2013)","journal-title":"Opt. \u2013 Int. J. Light Electron Opt."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Gyawali, B., Solorio, T., Wardman, B.: Evaluating a semi-supervised approach to phishing URL identification in a realistic scenario. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp: 176\u2013183. ACM (2011)","DOI":"10.1145\/2030376.2030397"},{"key":"39_CR9","unstructured":"Debarr, D.: Spam, phishing, and fraud detection using random projections, adversarial learning, and semi-supervised learning. Dissertations & theses \u2013 Gradworks (2013)"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Nigam, K., Ghani, R.: Analyzing the effectiveness and applicability of co-training, vol. 33, pp. 86\u201393. ACM (2002)","DOI":"10.1145\/354756.354805"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Blum, A.: Combining labeled and unlabeled data with co-training. In: Eleventh Conference on Computational Learning Theory, pp. 92\u2013100 (2000)","DOI":"10.1145\/279943.279962"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.procs.2013.05.006","volume":"17","author":"WJ Chen","year":"2013","unstructured":"Chen, W.J., Shao, Y.H., Ye, Y.F.: Improving Lap-TSVM with successive over relaxation and differential evolution. Procedia Comput. Sci. 17, 33\u201340 (2013)","journal-title":"Procedia Comput. Sci."},{"issue":"23","key":"39_CR13","doi-asserted-by":"publisher","first-page":"6027","DOI":"10.1016\/j.ijleo.2013.04.078","volume":"124","author":"Y Li","year":"2013","unstructured":"Li, Y., Xiao, R., Feng, J.: A semi-supervised learning approach for detection of phishing webpages. Opt. - Int. J. Light Electron Opt. 124(23), 6027\u20136033 (2013)","journal-title":"Opt. - Int. J. Light Electron Opt."},{"issue":"12","key":"39_CR14","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.1016\/S0167-8655(03)00008-4","volume":"24","author":"YS Chen","year":"2003","unstructured":"Chen, Y.S., Wang, G.P., Dong, S.H.: Learning with progressive transductive support vector machine. Pattern Recognit. Lett. 24(12), 1845\u20131855 (2003)","journal-title":"Pattern Recognit. Lett."},{"issue":"2","key":"39_CR15","first-page":"1530","volume":"172","author":"O Chapelle","year":"2006","unstructured":"Chapelle, O., Sch\u00f6lkopf, B., Zien, A.: Semi-supervised learning. J. R. Stat. Soc. 172(2), 1530 (2006)","journal-title":"J. R. Stat. Soc."},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Clark, S., Curran, J.R., Osborne, M.: Bootstrapping POS taggers using unlabeled data, p. 49 (2003)","DOI":"10.3115\/1119176.1119183"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 639\u2013648. ACM, New York (2007)","DOI":"10.1145\/1242572.1242659"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Garera S., Provos N., Chew M.: A Framework for Detection and Measurement of Phishing Attacks, ACM Workshop on Recurring Malcode, pp. 1\u20138. ACM (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"James, J., Sandhya, L., Thomas, C.: Detection of phishing URLs using machine learning techniques. In: International Conference on Control Communication and Computing, pp. 304. IEEE (2014)","DOI":"10.1109\/ICCC.2013.6731669"},{"key":"39_CR20","unstructured":"Soska, K., Christin, N.: Automatically detecting vulnerable websites before they turn malicious. In: Usenix Conference on Security Symposium, p. 625. USENIX Association (2014)"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Pradeepthi, K.V., Kannan, A.: Performance Study of classification techniques for phishing URL detection. In: Sixth International Conference on Advanced Computing, pp. 135\u2013139. IEEE (2015)","DOI":"10.1109\/ICoAC.2014.7229761"},{"key":"39_CR22","unstructured":"PhishTank Homepage. https:\/\/www.phishtank.com\/. Accessed 21 Feb 2018"},{"key":"39_CR23","unstructured":"DMOZ Homepage. http:\/\/www.dmoz.org\/. Accessed 21 Feb 2018"},{"key":"39_CR24","unstructured":"Scikit-learn Homepage. http:\/\/scikit-learn.org\/. Accessed 24 Feb 2018"}],"container-title":["Lecture Notes in Computer Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93803-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T01:56:04Z","timestamp":1751680564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93803-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319938028","9783319938035"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93803-5_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.guide2research.com\/conference\/dmbd-2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}