{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:06:02Z","timestamp":1774159562496,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642150364","type":"print"},{"value":"9783642150371","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15037-1_20","type":"book-chapter","created":{"date-parts":[[2010,8,12]],"date-time":"2010-08-12T04:01:17Z","timestamp":1281585677000},"page":"235-246","source":"Crossref","is-referenced-by-count":22,"title":["Consensus Clustering and Supervised Classification for Profiling Phishing Emails in Internet Commerce Security"],"prefix":"10.1007","author":[{"given":"Richard","family":"Dazeley","sequence":"first","affiliation":[]},{"given":"John L.","family":"Yearwood","sequence":"additional","affiliation":[]},{"given":"Byeong H.","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Andrei V.","family":"Kelarev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Ailon, N., Charikar, M., Newman, A.: Aggregating inconsistent information: ranking and clustering. In: Proc. 37th Annual ACM Symposium on Theory of Computing, pp. 684\u2013693 (2005)","DOI":"10.1145\/1060590.1060692"},{"key":"20_CR2","unstructured":"Anti-Phishing Working Group (2009), \n                    \n                      http:\/\/apwg.org\/\n                    \n                    \n                   (retrieved April 2010)"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"3192","DOI":"10.1016\/j.patcog.2008.04.004","volume":"41","author":"A.M. Bagirov","year":"2008","unstructured":"Bagirov, A.M.: Modified global k-means algorithm for minimum sum-of-squares clustering problems. Pattern Recognition\u00a041, 3192\u20133199 (2008)","journal-title":"Pattern Recognition"},{"key":"20_CR4","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2001)","edition":"2"},{"key":"20_CR5","unstructured":"Fern, X.Z., Brodley, C.E.: Cluster ensembles for high dimensional clustering: an empirical study. J.\u00a0Machine Learning Research (2004)"},{"key":"20_CR6","first-page":"36","volume-title":"Proc. 21st Internat. Conference on Machine Learning, ICML 2004","author":"X.Z. Fern","year":"2004","unstructured":"Fern, X.Z., Brodley, C.E.: Solving cluster ensemble problems by bipartite graph partitioning. In: Proc. 21st Internat. Conference on Machine Learning, ICML 2004, Banff, Alberta, Canada, July 4-8, vol.\u00a069, p. 36. ACM, New York (2004)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/1242572.1242660","volume-title":"Proc. 16th Internat. Conf. on the World Wide Web, WWW 2007","author":"I. Fette","year":"2007","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proc. 16th Internat. Conf. on the World Wide Web, WWW 2007, pp. 649\u2013656. ACM Press, New York (2007)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Filkov, V., Skiena, S.: Heterogeneous data integration with the consensus clustering formalism. In: Proc. of Data Integration in the Life Sciences, pp. 110\u2013123 (2004)","DOI":"10.1007\/978-3-540-24745-6_8"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Goder, A., Filkov, V.: Consensus clustering algorithms: comparison and refinement. In: Proc. Tenth SIAM Workshop on Algorithm Engineering and Experiments, ALENEX 2008, pp. 109\u2013117 (2008)","DOI":"10.1137\/1.9781611972887.11"},{"key":"20_CR10","volume-title":"Algorithms for Clustering Data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice Hall, Englewood Cliffs (1988)"},{"issue":"3","key":"20_CR11","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Computing Surveys\u00a031(3), 264\u2013323 (1999)","journal-title":"ACM Computing Surveys"},{"key":"20_CR12","unstructured":"Joachims, T.: A probabilistic analysis of the Rocchio algorithm with TF-IDF for text categorization. In: Proc. 14th Internat. Conf. Machine Learning, pp. 143\u2013151 (1997)"},{"key":"20_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/11961239_17","volume-title":"Advances in Knowledge Acquisition and Management","author":"B.H. Kang","year":"2006","unstructured":"Kang, B.H., Kelarev, A.V., Sale, A.H.J., Williams, R.N.: A new model for classifying DNA code inspired by neural networks and FSA. In: Hoffmann, A., Kang, B.-h., Richards, D., Tsumoto, S. (eds.) PKAW 2006. LNCS (LNAI), vol.\u00a04303, pp. 187\u2013198. Springer, Heidelberg (2006)"},{"key":"20_CR14","unstructured":"Karypis, G., Kumar, V.: METIS: A software package for partitioning unstructured graphs, partitioning meshes, and computing fill-reducing orderings of sparse matrices, Technical Report, University of Minnesota, Department of Computer Science and Engineering, Army HPC Research Centre, Minneapolis (1998)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Layton, R., Watters, P.: Determining provenance in phishing websites using automated conceptual analysis. In: Proc. 4th Annual APWG eCrime Researchers Summit, Tacoma, WA (2009)","DOI":"10.1109\/ECRIME.2009.5342614"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Layton, R., Brown, S., Watters, P.: Using differencing to increase distinctiveness for phishing website clustering. In: Proc. Cybercrime and Trustworthy Computing Workshop, CTC 2009, Brisbane, Australia (2009)","DOI":"10.1109\/UIC-ATC.2009.62"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S0031-3203(02)00060-2","volume":"36","author":"A. Likas","year":"2003","unstructured":"Likas, A., Vlassis, N., Verbeek, J.J.: The global k-means clustering algorithm. Pattern Recognition\u00a036, 451\u2013461 (2003)","journal-title":"Pattern Recognition"},{"key":"20_CR18","unstructured":"Ma, L., Yearwood, J., Watters, P.A.: Establishing phishing provenance using orthographic features, APWG E-crime Research Summit (2009)"},{"key":"20_CR19","unstructured":"OECD Task Force on Spam, OECD Anti-Spam Toolkit and its Annexes (2009), \n                    \n                      http:\/\/www.oecd-antispam.org\/\n                    \n                    \n                   (retrieved April 2010)"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1162\/153244303321897735","volume":"3","author":"A. Strehl","year":"2002","unstructured":"Strehl, A., Ghosh, J.: Cluster ensembles - a knowledge reuse framework for combining multiple partitions. J.\u00a0Machine Learning Research\u00a03, 583\u2013617 (2002)","journal-title":"J.\u00a0Machine Learning Research"},{"key":"20_CR21","volume-title":"Introduction to Data Mining","author":"P.N. Tan","year":"2005","unstructured":"Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison Wesley, Reading (2005)"},{"key":"20_CR22","volume-title":"Pattern Recognition","author":"S. Theodoridis","year":"2008","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern Recognition, 4th edn. Academic Press, London (2008)","edition":"4"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Topchy, A., Jain, A.K., Punch, W.: Combining multiple weak clusterings. In: Proc. IEEE Internat. Conf. on Data Mining, pp. 331\u2013338 (2003)","DOI":"10.1109\/ICDM.2003.1250937"},{"key":"20_CR24","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Elsevier\/Morgan Kaufman, Amsterdam (2005)"},{"key":"20_CR25","unstructured":"Yearwood, J.L., Kang, B.H., Kelarev, A.V.: Experimental investigation of classification algorithms for ITS dataset. In: PKAW 2008, Pacific Rim Knowledge Acquisition Workshop, Hanoi, Vietnam, December 15-16, pp. 262\u2013272 (2008)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Management and Acquisition for Smart Systems and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15037-1_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:45:23Z","timestamp":1619786723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15037-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150364","9783642150371"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15037-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}