{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:53:09Z","timestamp":1742989989130,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819759361"},{"type":"electronic","value":"9789819759378"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5937-8_4","type":"book-chapter","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:02:36Z","timestamp":1723449756000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Phishing Detection Using Ensemble of\u00a0Classifiers"],"prefix":"10.1007","author":[{"given":"David Raphael M.","family":"Daza","sequence":"first","affiliation":[]},{"given":"Frank Cally A.","family":"Tabuco","sequence":"additional","affiliation":[]},{"suffix":"Jr.","given":"Prospero C.","family":"Naval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"issue":"9","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.3390\/electronics9091514","volume":"9","author":"A Aljofey","year":"2020","unstructured":"Aljofey, A., Jiang, Q., Qu, Q., Huang, M., Niyigena, J.P.: An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9(9), 1514 (2020)","journal-title":"Electronics"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/COMST.2019.2957750","volume":"22","author":"A Das","year":"2019","unstructured":"Das, A., Baki, S., El Aassal, A., Verma, R., Dunbar, A.: SoK: a comprehensive reexamination of phishing research from the security perspective. IEEE Commun. Surv. Tutor. 22(1), 671\u2013708 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590 (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"4_CR5","unstructured":"Phishing attacks growing in scale and sophistication. Quarterly Threat Trends September 2017 (2017)"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Kern, C., Kesavan, A., Daswani, N.: Foundations of Security: What Every Programmer Needs to Know. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-1-4302-0377-3","DOI":"10.1007\/978-1-4302-0377-3"},{"key":"4_CR7","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C.: URLNet: learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162 (2018)"},{"key":"4_CR8","unstructured":"Van\u00a0der Merwe, A., Loock, M., Dabrowski, M.: Characteristics and responsibilities involved in a phishing attack. In: Proceedings of the 4th International Symposium on Information and Communication Technologies, pp. 249\u2013254 (2005)"},{"key":"4_CR9","unstructured":"Naval, P.C.: Classifier ensembles (2020)"},{"key":"4_CR10","unstructured":"Rekouche, K.: Early phishing. arXiv preprint arXiv:1106.4692 (2011)"},{"key":"4_CR11","unstructured":"Rivas, R.: Pandemic lets loose scammers in recession-hit Philippines. Rappler (2020). https:\/\/www.rappler.com\/business\/coronavirus-pandemic-lets-loose-scammers-philippines"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Tajaddodianfar, F., Stokes, J.W., Gururajan, A.: Texception: a character\/word-level deep learning model for phishing URL detection. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2857\u20132861. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053670"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Ubing, A.A., Jasmi, S.K.B., Abdullah, A., Jhanjhi, N., Supramaniam, M.: Phishing website detection: an improved accuracy through feature selection and ensemble learning. Int. J. Adv. Comput. Sci. Appl. 10(1) (2019)","DOI":"10.14569\/IJACSA.2019.0100133"},{"key":"4_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106438","volume":"33","author":"G Vrban\u010di\u010d","year":"2020","unstructured":"Vrban\u010di\u010d, G., Fister, I., Jr., Podgorelec, V.: Datasets for phishing websites detection. Data Brief 33, 106438 (2020)","journal-title":"Data Brief"},{"key":"4_CR15","unstructured":"Warburton, D.: 2020 phishing and fraud report phishing during a pandemic (2020)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Wei, W., Ke, Q., Nowak, J., Korytkowski, M., Scherer, R., Wo\u017aniak, M.: Accurate and fast URL phishing detector: a convolutional neural network approach. Comput. Netw. 107275 (2020)","DOI":"10.1016\/j.comnet.2020.107275"},{"key":"4_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106505","volume":"95","author":"E Zhu","year":"2020","unstructured":"Zhu, E., Ju, Y., Chen, Z., Liu, F., Fang, X.: DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features. Appl. Soft Comput. 95, 106505 (2020)","journal-title":"Appl. Soft Comput."}],"container-title":["Communications in Computer and Information Science","Recent Challenges in Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5937-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:07:20Z","timestamp":1723450040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5937-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819759361","9789819759378"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5937-8_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ras Al Khaimah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2024\/index.php#about","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}