{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:04:57Z","timestamp":1742979897810,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_6","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"55-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning Techniques for the Investigation of Phishing Websites"],"prefix":"10.1007","author":[{"family":"Ajaykumar K. B.","sequence":"first","affiliation":[]},{"given":"Bhawana","family":"Rudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"6_CR1","unstructured":"AO Kaspersky Lab: The Dangers of Phishing: Help employees avoid the lure of cybercrime (2017). [Online] https:\/\/go.kaspersky.com\/Dangers-Phishing-Landing-Page-Soc.html , 30 Oct 2017"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Jakobsson, E., Myers, E.: Phishing and Counter-Measures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley, 2006, p. 23","DOI":"10.1002\/0470086106"},{"key":"6_CR3","unstructured":"A Financial threats in 2016: Every Second Phishing Attack Aims to Steal Your Money Internet: https:\/\/www.kaspersky.com\/about\/pressreleases\/2017nancial-threats-in2016 . 22 Feb 2017 [30 Oct 2017]"},{"key":"6_CR4","unstructured":"Blasi, M.: Techniques for Detecting Zero Day Phishing Websites. M.A. thesis, Iowa State University, USA (2009)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, L.A.T., To, B.L., Nguyen, H.K., Nguyen, M.H.: Detecting phishing web sites: a heuristic URL-based approach. In: 2013 International Conference on Advanced Technologies for Communications (ATC 2013), pp. 597\u2013602 (2013)","DOI":"10.1109\/ATC.2013.6698185"},{"issue":"Supplement C","key":"6_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.procs.2015.06.017","volume":"54","author":"RS Rao","year":"2015","unstructured":"Rao, R.S., Ali, S.T.: PhishShield: A desktop application to detect Phishing webpages through heuristic approach. Procedia Comput. Sci. 54(Supplement C), 147\u2013156 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"6_CR7","unstructured":"VanderPlas, J.: Python Data Science Handbook, 1st edn, 1005 Gravenstein Highway North, Sebastopol, CA 95472.: OReilly Media, Inc., p. 331515 (2016)"},{"key":"6_CR8","first-page":"210","volume-title":"Web Phishing Detection Using Classifier Ensemble","author":"N Sanglerdsinlapachai","year":"2010","unstructured":"Sanglerdsinlapachai, N., Rungsawang, A.: Web Phishing Detection Using Classifier Ensemble, pp. 210\u2013215. NY, USA, New York (2010)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: a FeatureRich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21:1\u201321:28 (2011)","DOI":"10.1145\/2019599.2019606"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443\u2013458 (2014)","journal-title":"Neural Comput. Appl."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Pradeepthi, K.V., Kannan, A.: Performance study of classification techniques for phishing URL detection. In: Sixth International Conference on Advanced Computing (ICoAC), pp. 135\u2013139 (2014)","DOI":"10.1109\/ICoAC.2014.7229761"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TNSM.2014.2377295","volume":"11","author":"S Marchal","year":"2014","unstructured":"Marchal, S., Franois, J., State, R., Engel, T.: PhishStorm: detecting phishing with streaming analytics. IEEE Trans. Netw. Serv. Manage. 11(4), 458\u2013471 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"6_CR13","unstructured":"PhishTank Join the ght against phishing. [Online]. Available: https:\/\/www.phishtank.com\/"},{"key":"6_CR14","unstructured":"https:\/\/docs.python.org\/3\/library\/urllib.html"},{"key":"6_CR15","unstructured":"https:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/doc\/"},{"key":"6_CR16","unstructured":"https:\/\/pypi.org\/project\/python-whois\/"},{"key":"6_CR17","unstructured":"https:\/\/pypi.org\/project\/favicon\/"},{"key":"6_CR18","unstructured":"https:\/\/docs.python.org\/3\/library\/socket.html"},{"key":"6_CR19","unstructured":"https:\/\/docs.python.org\/3\/library\/ssl.html"},{"key":"6_CR20","unstructured":"https:\/\/imbalanced-learn.readthedocs.io\/en\/stable\/oversampling.html"},{"key":"6_CR21","unstructured":"Alswailem, A., Alabdullah, B., Alrumayh, N.,Alsedrani, A.: Detecting Phishing Websites Using Machine Learning. 978-1-7281-0108-8\/19\/\\$31.00 (2019). IEEE"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T00:58:50Z","timestamp":1696640330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}