{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:40Z","timestamp":1742913700720,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819702923"},{"type":"electronic","value":"9789819702930"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0293-0_9","type":"book-chapter","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T13:02:24Z","timestamp":1714136544000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fraudulent E-Commerce Website Detection Using Convolutional Neural Network Based on Image Features"],"prefix":"10.1007","author":[{"given":"Nurfazrina Mohd","family":"Zamry","sequence":"first","affiliation":[]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Khoo","sequence":"additional","affiliation":[]},{"given":"Mohamad Nizam","family":"Kassim","sequence":"additional","affiliation":[]},{"given":"Zanariah","family":"Zainudin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"issue":"December","key":"9_CR1","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-76351-4_30","volume":"734","author":"M Maktabar","year":"2018","unstructured":"Maktabar M, Zainal A, Maarof MA, Kassim MN (2018) Content based fraudulent website detection using supervised machine learning techniques. Adv Intell Syst Comput 734(December):294\u2013304. https:\/\/doi.org\/10.1007\/978-3-319-76351-4_30","journal-title":"Adv Intell Syst Comput"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Wu KT, Chou SH, Chen SW, Tsai CT, Yuan SM (2018) Application of machine learning to identify Counterfeit Website. In: ACM international conference proceeding series, pp 321\u2013324. https:\/\/doi.org\/10.1145\/3282373.3282407","DOI":"10.1145\/3282373.3282407"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Khoo E, Zainal A, Ariffin N, Kassim MN, Maarof MA, Bakhtiari M (2021) Fraudulent e-commerce website detection model using html, text and image features. Adv Intell Syst Comput 1182 AISC:177\u2013186. https:\/\/doi.org\/10.1007\/978-3-030-49345-5_19","DOI":"10.1007\/978-3-030-49345-5_19"},{"issue":"24","key":"9_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21248281","volume":"21","author":"R Yang","year":"2021","unstructured":"Yang R, Zheng K, Wu B, Wu C, Wang X (2021) Phishing website detection based on deep convolutional neural network and random forest ensemble learning. Sensors 21(24):1\u201318. https:\/\/doi.org\/10.3390\/s21248281","journal-title":"Sensors"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Rajab M (2018) An anti-phishing method based on feature analysis. In: ACM international conference proceeding series, pp 133\u2013139. https:\/\/doi.org\/10.1145\/3184066.3184082","DOI":"10.1145\/3184066.3184082"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"97258","DOI":"10.1109\/ACCESS.2020.2995157","volume":"8","author":"D Liu","year":"2020","unstructured":"Liu D, Lee JH (2020) CNN based malicious website detection by invalidating multiple web spams. IEEE Access 8:97258\u201397266. https:\/\/doi.org\/10.1109\/ACCESS.2020.2995157","journal-title":"IEEE Access"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Zhou X, Zhang Z, Wang L, Wang P (2019) A model based on siamese neural network for online transaction fraud detection. In: Proceeding international jt. conference neural networks, 2019. https:\/\/doi.org\/10.1109\/IJCNN.2019.8852295","DOI":"10.1109\/IJCNN.2019.8852295"},{"key":"9_CR8","first-page":"177","volume":"2616","author":"I Sabadash","year":"2020","unstructured":"Sabadash I, Dumanskyi N, Korobiichuk I (2020) Methods and means of identifying fraudulent websites. CEUR Workshop Proc 2616:177\u2013186","journal-title":"CEUR Workshop Proc"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Almousa M (2022) Phishing website detection\u202f: how effective are deep learning-based models and hyperparameter optimization\u202f?, pp 1\u201319. https:\/\/doi.org\/10.1002\/spy2.256","DOI":"10.1002\/spy2.256"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Abbasi A, Zhang Z, Zimbra D, Chen H, Nunamaker JF (2010) Detecting fake websites: the contribution of statistical learning theory. MIS Q Manag Inf Syst 34(3):435\u2013461. https:\/\/doi.org\/10.2307\/25750686","DOI":"10.2307\/25750686"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Abbasi A, Chen H (2009) A comparison of fraud cues and classification methods for fake escrow website detection. Inf Technol Manag 10(2\u20133):83\u2013101. https:\/\/doi.org\/10.1007\/s10799-009-0059-0","DOI":"10.1007\/s10799-009-0059-0"},{"key":"9_CR12","unstructured":"Mazalan NASB, Zainal A (2017) Data analytics and classification of fraud website. 2:1\u20137"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Zabihimayvan M, Doran D (2019) Fuzzy rough set feature selection to enhance phishing attack detection. arXiv","DOI":"10.1109\/FUZZ-IEEE.2019.8858884"},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.icte.2019.06.001","volume":"6","author":"MS Hanif","year":"2020","unstructured":"Hanif MS, Bilal M (2020) Competitive residual neural network for image classification. ICT Exp 6(1):28\u201337. https:\/\/doi.org\/10.1016\/j.icte.2019.06.001","journal-title":"ICT Exp"},{"key":"9_CR15","unstructured":"Yang Y, Zheng L, Zhang J, Cui Q, Li Z, Yu PS (2018) TI-CNN: convolutional neural networks for fake news detection. Retrieved from http:\/\/arxiv.org\/abs\/1806.00749"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Liu D, Lee JH, Wang W, Wang Y (2019) Malicious websites detection via CNN based screenshot recognition\u2217. In: Procceding\u20142019 international conference intellectual computer its emerging application ICEA 2019, 61375093:115\u2013119. https:\/\/doi.org\/10.1109\/ICEA.2019.8858300","DOI":"10.1109\/ICEA.2019.8858300"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Nasir JA, Khan OS, Varlamis I (2021) Fake news detection: A hybrid CNN-RNN based deep learning approach. Int J Inf Manag Data Insights 1(1). https:\/\/doi.org\/10.1016\/j.jjimei.2020.100007","DOI":"10.1016\/j.jjimei.2020.100007"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Sastrawan IK, Bayupati IPA, Arsa DMS (2021) Detection of fake news using deep learning CNN\u2013RNN based methods. ICT Exp. https:\/\/doi.org\/10.1016\/j.icte.2021.10.003","DOI":"10.1016\/j.icte.2021.10.003"},{"key":"9_CR19","unstructured":"\u201cAnthropologie.\u201d https:\/\/www.anthropologie.com\/"},{"key":"9_CR20","unstructured":"\u201cIsabel Marant.\u201d https:\/\/www.isabelmarant.com\/my"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data Science and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0293-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T13:05:44Z","timestamp":1714136744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0293-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819702923","9789819702930"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0293-0_9","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DaSET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Data Science and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"daset2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icdaset.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}