{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T11:28:26Z","timestamp":1776770906327,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811580604","type":"print"},{"value":"9789811580611","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-8061-1_13","type":"book-chapter","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:08:45Z","timestamp":1607630925000},"page":"151-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An Intelligent Phishing Detection Scheme Using Machine Learning"],"prefix":"10.1007","author":[{"given":"Aaisha","family":"Makkar","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Lakshit","family":"Sama","sequence":"additional","affiliation":[]},{"given":"Satyam","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Yash","family":"Samdani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"issue":"8","key":"13_CR1","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1056\/NEJMp1006602","volume":"363","author":"GI Barbash","year":"2010","unstructured":"Barbash GI (2010) New technology and health care costs-the case of robot-assisted surgery. The New Engl J Medi 363(8):701","journal-title":"The New Engl J Medi"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Brady M (1985) Artificial intelligence and robotics. Artif Intell 26(1):79\u2013121","DOI":"10.1016\/0004-3702(85)90013-X"},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1093\/geront\/41.4.449","volume":"41","author":"LD Burgio","year":"2001","unstructured":"Burgio LD, Allen-Burge R, Roth DL, Bourgeois MS, Dijkstra K, Gerstle J, Jackson E, Bankester L (2001) Come talk with me: Improving communication between nursing assistants and nursing home residents during care routines. The Gerontologist 41(4):449\u2013460","journal-title":"The Gerontologist"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Erickson T, Danis CM, Kellogg WA, Helander ME (2008) Assistance: the work practices of human administrative assistants and their implications for it and organizations. In: Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, pp 609\u2013618","DOI":"10.1145\/1460563.1460658"},{"key":"13_CR5","unstructured":"EY (2019 (accessed April 21, 2019)) Report by ey.com. https:\/\/www.ey.com\/Publication\/vwLUAssets\/EY-global-information-security-survey-2014\/FILE\/EY-global-information-security-survey-2014.pdf"},{"key":"13_CR6","unstructured":"F5 (2019 (accessed April 20, 2019)) Report by f5 labs. https:\/\/www.darkreading.com\/attacks-breaches\/new-report-iot-now-top-internet-attack-target\/d\/d-id\/1333147"},{"key":"13_CR7","unstructured":"Forbes (2019 (accessed October 11, 2019)) Artificial intelligence examples. https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/04\/30\/27-incredible-examples-of-ai-and-machine-learning-in-practice\/#67c9eb217502"},{"key":"13_CR8","unstructured":"Fortune (2019 (accessed October 11, 2019)) Artificial intelligence could be a boon to the global economy. https:\/\/fortune.com\/2019\/10\/09\/artificial-intelligence-14-trillion-boon-only-if-overcome-one-thing\/"},{"key":"13_CR9","unstructured":"HP (2019 (accessed April 20, 2019)) Internet of things devices. https:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=1744676"},{"issue":"4","key":"13_CR10","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1136\/svn-2017-000101","volume":"2","author":"F Jiang","year":"2017","unstructured":"Jiang F, Jiang Y, Zhi H, Dong Y, Li H, Ma S, Wang Y, Dong Q, Shen H, Wang Y (2017) Artificial intelligence in healthcare: past, present and future. Stroke Vasc Neurol 2(4):230\u2013243","journal-title":"Stroke Vasc Neurol"},{"issue":"7","key":"13_CR11","first-page":"132","volume":"5","author":"F Kausar","year":"2014","unstructured":"Kausar F, Al-Otaibi B, Al-Qadi A, Al-Dossari N (2014) Hybrid client side phishing websites detection approach. Int J Adv Comput Sci Appl (IJACSA) 5(7):132\u2013140","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kruegel C, Vigna G (2003) Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM conference on computer and communications security, ACM, pp 251\u2013261","DOI":"10.1145\/948109.948144"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.future.2018.07.046","volume":"90","author":"A Makkar","year":"2019","unstructured":"Makkar A, Kumar N (2019) Cognitive spammer: a framework for pagerank analysis with split by over-sampling and train by under-fitting. Future Gener Comput Syst 90:381\u2013404","journal-title":"Future Gener Comput Syst"},{"key":"13_CR14","volume-title":"Phishing websites features","author":"RM Mohammad","year":"2015","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2015) Phishing websites features. University of Huddersfield, School of Computing and Engineering"},{"key":"13_CR15","unstructured":"Schorr H, Rappaport A (1989) Innovative applications of artificial intelligence. Cambridge, MA, MIT Press, , 379 p (For individual items see A90-32502 to A90-32504)"},{"key":"13_CR16","unstructured":"Sigmoidal (2019 (accessed October 11, 2019)) Artificial intelligence in healthcare. https:\/\/sigmoidal.io\/artificial-intelligence-and-machine-learning-for-healthcare\/#targetText=Artificial"},{"key":"13_CR17","unstructured":"Times E (2019 (accessed April 20, 2019)) Report by economic times. https:\/\/telecom.economictimes.indiatimes.com\/news\/iot-devices-malware-grew-73-in-q3-2018-report\/67171649"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994\u201312000","DOI":"10.1016\/j.eswa.2009.05.029"},{"issue":"6","key":"13_CR19","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIS.2010.151","volume":"25","author":"D Zeng","year":"2010","unstructured":"Zeng D, Chen H, Lusch R, Li SH (2010) Social media analytics and intelligence. IEEE Intell Syst 25(6):13\u201316","journal-title":"IEEE Intell Syst"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Sixth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8061-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:14:07Z","timestamp":1607631247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8061-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"ISBN":["9789811580604","9789811580611"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8061-1_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,11]]},"assertion":[{"value":"11 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}