{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:16:18Z","timestamp":1776784578262,"version":"3.51.2"},"reference-count":121,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10115-022-01672-x","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T10:07:10Z","timestamp":1653300430000},"page":"1457-1500","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":118,"title":["Applications of deep learning for phishing detection: a systematic literature review"],"prefix":"10.1007","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-2930","authenticated-orcid":false,"given":"Cagatay","family":"Catal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7023-9469","authenticated-orcid":false,"given":"G\u00f6rkem","family":"Giray","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8538-7261","authenticated-orcid":false,"given":"Bedir","family":"Tekinerdogan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3250-4866","authenticated-orcid":false,"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Suyash","family":"Shukla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,23]]},"reference":[{"issue":"3","key":"1672_CR1","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s40313-015-0173-7","volume":"26","author":"W Abed","year":"2015","unstructured":"Abed W, Sharma S, Sutton R, Motwani A (2015) A robust bearing fault detection and diagnosis technique for brushless DC motors under non-stationary operating conditions. J Control Autom Electr Syst 26(3):241\u2013254","journal-title":"J Control Autom Electr Syst"},{"key":"1672_CR2","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-01-2020-0036","author":"MA Adebowale","year":"2020","unstructured":"Adebowale MA, Lwin KT, Hossain MA (2020) Intelligent phishing detection scheme using deep learning algorithms. J Enterp Inf Manag. https:\/\/doi.org\/10.1108\/JEIM-01-2020-0036","journal-title":"J Enterp Inf Manag"},{"key":"1672_CR3","doi-asserted-by":"crossref","unstructured":"Ali NB, Petersen K (2014) Evaluating strategies for study selection in systematic literature studies. In: Proceedings of the 8th ACM\/IEEE international symposium on empirical software engineering and measurement, pp 1\u20134","DOI":"10.1145\/2652524.2652557"},{"issue":"9","key":"1672_CR4","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.3390\/electronics9091514","volume":"9","author":"A Aljofey","year":"2020","unstructured":"Aljofey A, Jiang Q, Qu Q, Huang M, Niyigena JP (2020) An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9(9):1514","journal-title":"Electronics"},{"issue":"7","key":"1672_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s00521-016-2531-1","volume":"29","author":"A Almomani","year":"2018","unstructured":"Almomani A (2018) Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput Appl 29(7):483\u2013493","journal-title":"Neural Comput Appl"},{"key":"1672_CR6","doi-asserted-by":"crossref","unstructured":"Alom MZ, Taha TM (2017) Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE national aerospace and electronics conference (NAECON). IEEE, pp 63\u201369","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"1672_CR7","doi-asserted-by":"crossref","unstructured":"Amershi S, Begel A, Bird C, DeLine R, Gall H, Kamar E, Zimmermann T (2019) Software engineering for machine learning: a case study. In: 2019 IEEE\/ACM 41st international conference on software engineering: software engineering in practice (ICSE-SEIP). IEEE, pp 291\u2013300","DOI":"10.1109\/ICSE-SEIP.2019.00042"},{"key":"1672_CR8","doi-asserted-by":"publisher","first-page":"104037","DOI":"10.1016\/j.compbiomed.2020.104037","volume":"126","author":"A Amyar","year":"2020","unstructured":"Amyar A, Modzelewski R, Li H, Ruan S (2020) Multi-task deep learning based CT imaging analysis for COVID-19 pneumonia: Classification and segmentation. Comput Biol Med 126:104037","journal-title":"Comput Biol Med"},{"key":"1672_CR9","unstructured":"APWG GA, Manning R (2020) APWG Phishing Reports"},{"key":"1672_CR10","unstructured":"Basili VR, Caldiera G, Rombach HD (1994) The goal question metric approach.\nEncyclopedia of software engineering, pp 528\u2013532"},{"key":"1672_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2020","unstructured":"Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2020) A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst 76:139\u2013154","journal-title":"Telecommun Syst"},{"key":"1672_CR12","doi-asserted-by":"crossref","unstructured":"Benavides E, Fuertes W, Sanchez S, Sanchez M (2020) Classification of phishing attack solutions by employing deep learning techniques: a systematic literature review. In: Developments and advances in defense and security. Springer, Singapore, pp 51\u201364","DOI":"10.1007\/978-981-13-9155-2_5"},{"key":"1672_CR13","first-page":"153","volume":"19","author":"Y Bengio","year":"2006","unstructured":"Bengio Y, Lamblin P, Popovici D, Larochelle H (2006) Greedy layer-wise training of deep networks. Adv Neural Inf Process Syst 19:153\u2013160","journal-title":"Adv Neural Inf Process Syst"},{"issue":"4","key":"1672_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman DS, Buczak AL, Chavis JS, Corbett CL (2019) A survey of deep learning methods for cyber security. Information 10(4):122","journal-title":"Information"},{"key":"1672_CR15","doi-asserted-by":"crossref","unstructured":"Catal C (2012) On the application of genetic algorithms for test case prioritization: a systematic literature review. In: Proceedings of the 2nd international workshop on Evidential assessment of software technologies, pp 9\u201314","DOI":"10.1145\/2372233.2372238"},{"issue":"3","key":"1672_CR16","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s11219-012-9181-z","volume":"21","author":"C Catal","year":"2013","unstructured":"Catal C, Mishra D (2013) Test case prioritization: a systematic mapping study. Software Qual J 21(3):445\u2013478","journal-title":"Software Qual J"},{"key":"1672_CR17","doi-asserted-by":"publisher","first-page":"101613","DOI":"10.1016\/j.cose.2019.101613","volume":"88","author":"CMR Da Silva","year":"2020","unstructured":"Da Silva CMR, Feitosa EL, Garcia VC (2020) Heuristic-based strategy for Phishing prediction: a survey of URL-based approach. Comput Secur 88:101613","journal-title":"Comput Secur"},{"key":"1672_CR18","first-page":"58","volume":"57","author":"L Deng","year":"2012","unstructured":"Deng L (2012) Three classes of deep learning architectures and their applications: a tutorial survey. APSIPA Trans Signal Inf Process 57:58","journal-title":"APSIPA Trans Signal Inf Process"},{"issue":"3\u20134","key":"1672_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng L, Yu D (2014) Deep learning: methods and applications. Found Trends Signal Process 7(3\u20134):197\u2013387","journal-title":"Found Trends Signal Process"},{"issue":"4","key":"1672_CR20","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1109\/COMST.2017.2752087","volume":"19","author":"Z Dou","year":"2017","unstructured":"Dou Z, Khalil I, Khreishah A, Al-Fuqaha A, Guizani M (2017) Systematization of knowledge (SoK): a systematic review of software-based web phishing detection. IEEE Commun Surv Tutor 19(4):2797\u20132819","journal-title":"IEEE Commun Surv Tutor"},{"key":"1672_CR21","doi-asserted-by":"publisher","first-page":"22170","DOI":"10.1109\/ACCESS.2020.2969780","volume":"8","author":"A El Aassal","year":"2020","unstructured":"El Aassal A, Baki S, Das A, Verma RM (2020) An in-depth benchmarking and evaluation of phishing detection research for security needs. IEEE Access 8:22170\u201322192","journal-title":"IEEE Access"},{"issue":"21","key":"1672_CR22","doi-asserted-by":"publisher","first-page":"13451","DOI":"10.1007\/s00500-021-06095-4","volume":"25","author":"S Emamgholizadeh","year":"2021","unstructured":"Emamgholizadeh S, Mohammadi B (2021) New hybrid nature-based algorithm to integration support vector machine for prediction of soil cation exchange capacity. Soft Comput 25(21):13451\u201313464","journal-title":"Soft Comput"},{"issue":"2","key":"1672_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.20532\/cit.2019.1004702","volume":"27","author":"J Feng","year":"2019","unstructured":"Feng J, Zou L, Nan T (2019) A phishing webpage detection method based on stacked autoencoder and correlation coefficients. J Comput Inf Technol 27(2):41\u201354","journal-title":"J Comput Inf Technol"},{"key":"1672_CR24","unstructured":"Ferreira M (2019) Malicious URL detection using machine learning algorithms. In: Proc. Digit. Privacy Security Conf., pp 114\u2013122"},{"key":"1672_CR25","doi-asserted-by":"crossref","unstructured":"Fukushima K, Miyake S (1982) Neocognitron: a self-organizing neural network model for a mechanism of visual pattern recognition. In: Competition and cooperation in neural nets. Springer, Berlin, Heidelberg, pp 267\u2013285","DOI":"10.1007\/978-3-642-46466-9_18"},{"key":"1672_CR26","doi-asserted-by":"publisher","first-page":"5019","DOI":"10.1007\/s10462-020-09814-9","volume":"53","author":"T Gangavarapu","year":"2020","unstructured":"Gangavarapu T, Jaidhar CD, Chanduka B (2020) Applicability of machine learning in spam and phishing email filtering: review and approaches. Artif Intell Rev 53:5019\u20135081","journal-title":"Artif Intell Rev"},{"issue":"14\u201315","key":"1672_CR27","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0","volume":"32","author":"MW Gardner","year":"1998","unstructured":"Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer perceptron)\u2014a review of applications in the atmospheric sciences. Atmos Environ 32(14\u201315):2627\u20132636","journal-title":"Atmos Environ"},{"key":"1672_CR28","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp 249\u2013256"},{"key":"1672_CR29","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","volume":"73","author":"D Goel","year":"2018","unstructured":"Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Comput Secur 73:519\u2013544","journal-title":"Comput Secur"},{"key":"1672_CR30","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A, Bengio Y (2016) Deep learning, vol 1. MIT Press, Cambridge"},{"key":"1672_CR31","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.cose.2013.10.004","volume":"40","author":"R Gowtham","year":"2014","unstructured":"Gowtham R, Krishnamurthi I (2014) A comprehensive and efficacious architecture for detecting phishing webpages. Comput Secur 40:23\u201337","journal-title":"Comput Secur"},{"issue":"10","key":"1672_CR32","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff K, Srivastava RK, Koutn\u00edk J, Steunebrink BR, Schmidhuber J (2016) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222\u20132232","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1672_CR33","doi-asserted-by":"publisher","first-page":"104347","DOI":"10.1016\/j.engappai.2021.104347","volume":"104","author":"A Hannousse","year":"2021","unstructured":"Hannousse A, Yahiouche S (2021) Towards benchmark datasets for machine learning based website phishing detection: an experimental study. Eng Appl Artif Intell 104:104347","journal-title":"Eng Appl Artif Intell"},{"key":"1672_CR34","doi-asserted-by":"crossref","unstructured":"Hassler E, Carver JC, Kraft NA, Hale D (2014) Outcomes of a community workshop to identify and rank barriers to the systematic literature review process. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp 1\u201310","DOI":"10.1145\/2601248.2601274"},{"issue":"8","key":"1672_CR35","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"5","key":"1672_CR36","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359\u2013366","journal-title":"Neural Netw"},{"key":"1672_CR37","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1016\/j.procs.2015.07.104","volume":"55","author":"R Hrasko","year":"2015","unstructured":"Hrasko R, Pacheco AG, Krohling RA (2015) Time series prediction using restricted boltzmann machines and backpropagation. Procedia Comput Sci 55:990\u2013999","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"1672_CR38","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091\u20132121","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1672_CR39","first-page":"111","volume":"8","author":"R Kiruthiga","year":"2019","unstructured":"Kiruthiga R, Akila D (2019) Phishing websites detection using machine learning. Int J Recent Technol Eng 8(2):111\u2013114","journal-title":"Int J Recent Technol Eng"},{"issue":"1","key":"1672_CR40","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technol 51(1):7\u201315. https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","journal-title":"Inf Softw Technol"},{"key":"1672_CR41","doi-asserted-by":"publisher","DOI":"10.1201\/b19467","volume-title":"Evidence-based software engineering and systematic reviews","author":"BA Kitchenham","year":"2015","unstructured":"Kitchenham BA, Budgen D, Brereton P (2015) Evidence-based software engineering and systematic reviews, vol 4. CRC Press, Boca Raton"},{"issue":"1","key":"1672_CR42","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TBDATA.2020.2978915","volume":"8","author":"Q Li","year":"2020","unstructured":"Li Q, Cheng M, Wang J, Sun B (2020) LSTM based phishing detection for big email data. IEEE Trans Big Data 8(1):278\u2013288","journal-title":"IEEE Trans Big Data"},{"key":"1672_CR43","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.neucom.2019.02.056","volume":"347","author":"S Mahdavifar","year":"2019","unstructured":"Mahdavifar S, Ghorbani AA (2019) Application of deep learning to cybersecurity: a survey. Neurocomputing 347:149\u2013176","journal-title":"Neurocomputing"},{"issue":"6","key":"1672_CR44","first-page":"945","volume":"23","author":"S Maurya","year":"2020","unstructured":"Maurya S, Jain A (2020) Deep learning to combat phishing. J Stat Manag Syst 23(6):945\u2013957","journal-title":"J Stat Manag Syst"},{"key":"1672_CR45","volume-title":"Qualitative data analysis: a methods sourcebook","author":"MB Miles","year":"2019","unstructured":"Miles MB, Huberman AM, Salda\u00f1a J (2019) Qualitative data analysis: a methods sourcebook, 4th edn. SAGE Publications Inc, Thousand Oaks","edition":"4"},{"key":"1672_CR46","unstructured":"Mohamed AR, Dahl G, Hinton G (2009) Deep belief networks for phone recognition. In: Nips workshop on deep learning for speech recognition and related applications, vol 1, no 9, p 39"},{"key":"1672_CR47","doi-asserted-by":"publisher","first-page":"105024","DOI":"10.1016\/j.catena.2020.105024","volume":"198","author":"B Mohammadi","year":"2021","unstructured":"Mohammadi B, Guan Y, Moazenzadeh R, Safari MJS (2021) Implementation of hybrid particle swarm optimization-differential evolution algorithms coupled with multi-layer perceptron for suspended sediment load estimation. CATENA 198:105024","journal-title":"CATENA"},{"key":"1672_CR48","unstructured":"Mohammed Harun Babu R, Vinayakumar R, Soman KP (2018) A short review on applications of deep learning for cyber security. arXiv preprint arXiv:1812.06292"},{"key":"1672_CR49","doi-asserted-by":"crossref","unstructured":"Nagaraj K, Bhattacharjee B, Sridhar A, Sharvani G (2018) Detection of phishing websites using a novel twofold ensemble model. J Syst Inf Technol.","DOI":"10.1108\/JSIT-09-2017-0074"},{"key":"1672_CR50","unstructured":"Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: International conference on machine learning, pp 1310\u20131318"},{"issue":"03","key":"1672_CR51","doi-asserted-by":"publisher","first-page":"1950021","DOI":"10.1142\/S1469026819500214","volume":"18","author":"Y Peng","year":"2019","unstructured":"Peng Y, Tian S, Yu L, Lv Y, Wang R (2019) A joint approach to detect malicious URL based on attention mechanism. Int J Comput Intell Appl 18(03):1950021","journal-title":"Int J Comput Intell Appl"},{"key":"1672_CR52","doi-asserted-by":"crossref","unstructured":"Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: 12th international conference on evaluation and assessment in software engineering (EASE) 12, pp 1\u201310","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"1672_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1\u201318","journal-title":"Inf Softw Technol"},{"key":"1672_CR54","doi-asserted-by":"crossref","unstructured":"Qiu X, Zhang L, Ren Y, Suganthan PN, Amaratunga G (2014) Ensemble deep learning for regression and time series forecasting. In: 2014 IEEE symposium on computational intelligence in ensemble learning (CIEL). IEEE, pp 1\u20136","DOI":"10.1109\/CIEL.2014.7015739"},{"key":"1672_CR55","unstructured":"Ramzan Z, W\u00fcest C (2007) Phishing attacks: analyzing trends in 2006. In: CEAS"},{"key":"1672_CR56","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2019.02.011","volume":"83","author":"RS Rao","year":"2019","unstructured":"Rao RS, Pais AR (2019) Jail-Phish: an improved search engine based phishing detection system. Comput Secur 83:246\u2013267","journal-title":"Comput Secur"},{"key":"1672_CR57","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.comcom.2019.11.047","volume":"153","author":"R Ravi","year":"2020","unstructured":"Ravi R (2020) A performance analysis of software defined network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA). Comput Commun 153:375\u2013381","journal-title":"Comput Commun"},{"key":"1672_CR58","unstructured":"Sahoo D, Liu C, Hoi SC (2017) Malicious URL detection using machine learning: a survey. arXiv preprint arXiv:1701.07179"},{"issue":"1","key":"1672_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-020-17841-x","volume":"11","author":"L Seydoux","year":"2020","unstructured":"Seydoux L, Balestriero R, Poli P, De Hoop M, Campillo M, Baraniuk R (2020) Clustering earthquake signals and background noises in continuous seismic data with unsupervised deep learning. Nat Commun 11(1):1\u201312","journal-title":"Nat Commun"},{"key":"1672_CR60","doi-asserted-by":"publisher","first-page":"106089","DOI":"10.1016\/j.asoc.2020.106089","volume":"89","author":"S Sharmeen","year":"2020","unstructured":"Sharmeen S, Huda S, Abawajy J, Hassan MM (2020) An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl Soft Comput 89:106089","journal-title":"Appl Soft Comput"},{"key":"1672_CR61","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/23742917.2020.1714195","volume":"4","author":"V Shrivastava","year":"2020","unstructured":"Shrivastava V, Damodaran SS, Kamble M (2020) Adalward: a deep-learning framework for multi-class malicious webpage detection. J Cyber Secur Technol 4:153\u2013195","journal-title":"J Cyber Secur Technol"},{"key":"1672_CR62","doi-asserted-by":"crossref","unstructured":"Singh C, Meenu (2020) Phishing website detection based on machine learning: a survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS). IEEE, pp 398\u2013404","DOI":"10.1109\/ICACCS48705.2020.9074400"},{"issue":"1","key":"1672_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-020-01392-4","volume":"45","author":"M Somesha","year":"2020","unstructured":"Somesha M, Pais AR, Rao RS, Rathour VS (2020) Efficient deep learning techniques for the detection of phishing websites. S\u0101dhan\u0101 45(1):1\u201318","journal-title":"S\u0101dhan\u0101"},{"key":"1672_CR64","doi-asserted-by":"publisher","first-page":"2912","DOI":"10.1109\/JBHI.2020.2973614","volume":"24","author":"L Song","year":"2020","unstructured":"Song L, Lin JP, Wang ZJ, Wang H (2020) An end-to-end multi-task deep learning framework for skin lesion analysis. IEEE J Biomed Health Inform 24:2912\u20132921","journal-title":"IEEE J Biomed Health Inform"},{"key":"1672_CR65","first-page":"397","volume":"20","author":"LL Sullins","year":"2006","unstructured":"Sullins LL (2006) Phishing for a solution: Domestic and international approaches to decreasing online identity theft. Emory Int\u2019l L Rev 20:397","journal-title":"Emory Int'l L Rev"},{"issue":"3","key":"1672_CR66","doi-asserted-by":"publisher","first-page":"8428","DOI":"10.35940\/ijrte.C6527.098319","volume":"8","author":"K Sumathi","year":"2019","unstructured":"Sumathi K, Sujatha V (2019) Deep learning based-phishing attack detection. Int J Recent Technol Eng (IJRTE) 8(3):8428\u20138432","journal-title":"Int J Recent Technol Eng (IJRTE)"},{"key":"1672_CR67","doi-asserted-by":"crossref","unstructured":"Tarhan A, Giray G (2017) On the use of ontologies in software process assessment: a systematic literature review. In Proceedings of the 21st international conference on evaluation and assessment in software engineering, pp 2\u201311","DOI":"10.1145\/3084226.3084261"},{"issue":"1","key":"1672_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-020-00320-4","volume":"3","author":"J Torres-Soto","year":"2020","unstructured":"Torres-Soto J, Ashley EA (2020) Multi-task deep learning for cardiac rhythm detection in wearable devices. NPJ Digital Med 3(1):1\u20138","journal-title":"NPJ Digital Med"},{"key":"1672_CR69","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.compag.2018.12.044","volume":"157","author":"J Tummers","year":"2019","unstructured":"Tummers J, Kassahun A, Tekinerdogan B (2019) Obstacles and features of farm management information systems: a systematic literature review. Comput Electron Agric 157:189\u2013204. https:\/\/doi.org\/10.1016\/j.compag.2018.12.044","journal-title":"Comput Electron Agric"},{"issue":"18","key":"1672_CR70","doi-asserted-by":"publisher","first-page":"6266","DOI":"10.1002\/sec.1674","volume":"9","author":"G Varshney","year":"2016","unstructured":"Varshney G, Misra M, Atrey PK (2016) A survey and classification of web phishing detection schemes. Secur Commun Netw 9(18):6266\u20136284","journal-title":"Secur Commun Netw"},{"issue":"1","key":"1672_CR71","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S1361-3723(18)30007-1","volume":"2018","author":"I Vayansky","year":"2018","unstructured":"Vayansky I, Kumar S (2018) Phishing\u2013challenges and solutions. Comput Fraud Secur 2018(1):15\u201320","journal-title":"Comput Fraud Secur"},{"issue":"3","key":"1672_CR72","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3233\/JIFS-169429","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar R, Soman KP, Poornachandran P (2018) Evaluating deep learning approaches to characterize and classify malicious URL\u2019s. J Intell Fuzzy Syst 34(3):1333\u20131343","journal-title":"J Intell Fuzzy Syst"},{"key":"1672_CR73","doi-asserted-by":"publisher","first-page":"106438","DOI":"10.1016\/j.dib.2020.106438","volume":"33","author":"G Vrban\u010di\u010d","year":"2020","unstructured":"Vrban\u010di\u010d G, Fister I Jr, Podgorelec V (2020) Datasets for phishing websites detection. Data Brief 33:106438","journal-title":"Data Brief"},{"issue":"11","key":"1672_CR74","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1002\/sec.1441","volume":"9","author":"Y Wang","year":"2016","unstructured":"Wang Y, Cai WD, Wei PC (2016) A deep learning approach for detecting malicious JavaScript code. Secur Commun Netw 9(11):1520\u20131534","journal-title":"Secur Commun Netw"},{"issue":"8","key":"1672_CR75","doi-asserted-by":"publisher","first-page":"3016","DOI":"10.1007\/s10489-019-01433-4","volume":"49","author":"HH Wang","year":"2019","unstructured":"Wang HH, Yu L, Tian SW, Peng YF, Pei XJ (2019) Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl Intell 49(8):3016\u20133026","journal-title":"Appl Intell"},{"key":"1672_CR76","doi-asserted-by":"publisher","first-page":"2595794","DOI":"10.1155\/2019\/2595794","volume":"2019","author":"W Wang","year":"2019","unstructured":"Wang W, Zhang F, Luo X, Zhang S (2019b) PDRCNN: precise phishing detection with recurrent convolutional neural networks. Secur Commun Netw 2019:2595794. https:\/\/doi.org\/10.1155\/2019\/2595794","journal-title":"Secur Commun Netw"},{"issue":"1","key":"1672_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12874-020-00923-1","volume":"20","author":"L Wang","year":"2020","unstructured":"Wang L, Tong L, Davis D, Arnold T, Esposito T (2020) The application of unsupervised deep learning in predictive models using electronic health records. BMC Med Res Methodol 20(1):1\u20139","journal-title":"BMC Med Res Methodol"},{"key":"1672_CR78","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.neunet.2020.10.018","volume":"133","author":"X Wei","year":"2020","unstructured":"Wei X, Wei X, Kong X, Lu S, Xing W, Lu W (2020) FMixCutMatch for semi-supervised deep learning. Neural Netw 133:166\u2013176","journal-title":"Neural Netw"},{"key":"1672_CR79","doi-asserted-by":"publisher","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering\u2014EASE \u201914, 1\u201310. https:\/\/doi.org\/10.1145\/2601248.2601268","DOI":"10.1145\/2601248.2601268"},{"key":"1672_CR80","unstructured":"Wong M (2019) Deep learning models for malicious web content detection: an enterprise study (Doctoral dissertation)."},{"key":"1672_CR81","unstructured":"Wu Y, Schuster M, Chen Z, Le QV, Norouzi M, Macherey W, Klingner J (2016) Google\u2019s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144"},{"key":"1672_CR82","doi-asserted-by":"publisher","first-page":"101993","DOI":"10.1016\/j.cose.2020.101993","volume":"98","author":"P Xia","year":"2020","unstructured":"Xia P, Wang H, Zhang B, Ji R, Gao B, Wu L, Xu G (2020) Characterizing cryptocurrency exchange scams. Comput Secur 98:101993","journal-title":"Comput Secur"},{"key":"1672_CR83","doi-asserted-by":"publisher","first-page":"4678746","DOI":"10.1155\/2018\/4678746","volume":"2018","author":"P Yi","year":"2018","unstructured":"Yi P, Guan Y, Zou F, Yao Y, Wang W, Zhu T (2018) Web phishing detection using a deep learning framework. Wirel Commun Mobile Comput 2018:4678746. https:\/\/doi.org\/10.1155\/2018\/4678746","journal-title":"Wirel Commun Mobile Comput"},{"issue":"1","key":"1672_CR84","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/MSP.2010.939038","volume":"28","author":"D Yu","year":"2010","unstructured":"Yu D, Deng L (2010) Deep learning and its applications to signal and information processing [exploratory dsp]. IEEE Signal Process Mag 28(1):145\u2013154","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"1672_CR85","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1108\/EL-05-2019-0118","volume":"38","author":"A Zamir","year":"2020","unstructured":"Zamir A, Khan HU, Iqbal T, Yousaf N, Aslam F, Anjum A, Hamdani M (2020) Phishing web site detection using diverse machine learning algorithms. Electron Libr 38(1):65\u201380","journal-title":"Electron Libr"},{"key":"1672_CR86","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TSG.2020.3010510","volume":"12","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Wang J, Chen B (2020) Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach. IEEE Trans Smart Grid 12:623\u2013634","journal-title":"IEEE Trans Smart Grid"},{"key":"1672_CR87","doi-asserted-by":"crossref","unstructured":"Zuraiq AA, Alkasassbeh M (2019) Phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS). IEEE, pp 1\u20136","DOI":"10.1109\/ICTCS.2019.8923069"},{"issue":"5","key":"1672_CR88","doi-asserted-by":"publisher","first-page":"4497","DOI":"10.1109\/JIOT.2019.2954919","volume":"7","author":"S Anwar","year":"2020","unstructured":"Anwar S, Al-Obeidat F, Tubaishat A, Din S, Ahmad A, Khan FA, Jeon G, Loo J (2020) Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert. IEEE Internet Things J 7(5):4497\u20134504","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1672_CR89","first-page":"1","volume":"7","author":"FD Abdi","year":"2017","unstructured":"Abdi FD, Wenjuan L (2017) Malicious URL detection using convolutional neural network. J Int J Comput Sci Eng Inf Technol 7(6):1\u20138","journal-title":"J Int J Comput Sci Eng Inf Technol"},{"key":"1672_CR90","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-01-2020-0036","author":"MA Adebowale","year":"2020","unstructured":"Adebowale MA, Lwin KT, Hossain MA (2020) Intelligent phishing detection scheme using deep learning algorithms. J Enterp Inf Manag. https:\/\/doi.org\/10.1108\/JEIM-01-2020-0036","journal-title":"J Enterp Inf Manag"},{"issue":"3","key":"1672_CR91","doi-asserted-by":"publisher","first-page":"59","DOI":"10.5121\/ijnsa.2020.12304","volume":"12","author":"S Al-Ahmadi","year":"2020","unstructured":"Al-Ahmadi S (2020) PDMLP: phishing detection using multilayer perceptron. Int J Netw Secur Appl (IJNSA) 12(3):59\u201372. https:\/\/doi.org\/10.5121\/ijnsa.2020.12304","journal-title":"Int J Netw Secur Appl (IJNSA)"},{"issue":"6","key":"1672_CR92","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1049\/iet-ifs.2019.0006","volume":"13","author":"W Ali","year":"2019","unstructured":"Ali W, Ahmed AA (2019) Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Inf Secur 13(6):659\u2013669","journal-title":"IET Inf Secur"},{"issue":"4","key":"1672_CR93","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1108\/DTA-02-2020-0043","volume":"54","author":"M Arshey","year":"2020","unstructured":"Arshey M, Angel Viji KS (2020) An optimization-based deep belief network for the detection of phishing emails. Data Technol Appl 54(4):529\u2013549. https:\/\/doi.org\/10.1108\/DTA-02-2020-0043","journal-title":"Data Technol Appl"},{"issue":"6","key":"1672_CR94","doi-asserted-by":"publisher","first-page":"312","DOI":"10.3390\/info11060312","volume":"11","author":"A Baccouche","year":"2020","unstructured":"Baccouche A, Ahmed S, Sierra-Sosa D, Elmaghraby A (2020) Malicious text identification: deep learning from public comments and emails. Information 11(6):312","journal-title":"Information"},{"key":"1672_CR95","doi-asserted-by":"publisher","first-page":"101855","DOI":"10.1016\/j.cose.2020.101855","volume":"95","author":"AS Bozkir","year":"2020","unstructured":"Bozkir AS, Aydos M (2020) LogoSENSE: a companion HOG based logo detection scheme for phishing web page and e-mail brand recognition. Comput Secur 95:101855","journal-title":"Comput Secur"},{"issue":"8","key":"1672_CR96","first-page":"331","volume":"3","author":"HN Digwal","year":"2020","unstructured":"Digwal HN, Kavya NP (2020) Detection of phishing website based on deep learning. Int J Res Eng Sci Manag 3(8):331\u2013336","journal-title":"Int J Res Eng Sci Manag"},{"key":"1672_CR97","doi-asserted-by":"publisher","first-page":"56329","DOI":"10.1109\/ACCESS.2019.2913705","volume":"7","author":"Y Fang","year":"2019","unstructured":"Fang Y, Zhang C, Huang C, Liu L, Yang Y (2019) Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. IEEE Access 7:56329\u201356340","journal-title":"IEEE Access"},{"key":"1672_CR98","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0786-3","author":"F Feng","year":"2018","unstructured":"Feng F, Zhou Q, Shen Z, Yang X, Han L, Wang J (2018) The application of a novel neural network in the detection of phishing websites. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-018-0786-3","journal-title":"J Ambient Intell Human Comput"},{"key":"1672_CR99","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s42044-020-00067-x","volume":"4","author":"MS Kumar","year":"2020","unstructured":"Kumar MS, Indrani B (2020) Frequent rule reduction for phishing URL classification using fuzzy deep neural network model. Iran J Comput Sci 4:85\u201393","journal-title":"Iran J Comput Sci"},{"issue":"1","key":"1672_CR100","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TBDATA.2020.2978915","volume":"8","author":"Q Li","year":"2020","unstructured":"Li Q, Cheng M, Wang J, Sun B (2020) LSTM based phishing detection for big email data. IEEE Trans Big Data 8(1):278\u2013288. https:\/\/doi.org\/10.1109\/TBDATA.2020.2978915","journal-title":"IEEE Trans Big Data"},{"key":"1672_CR101","doi-asserted-by":"publisher","first-page":"101494","DOI":"10.1016\/j.is.2020.101494","volume":"91","author":"T Li","year":"2020","unstructured":"Li T, Kou G, Peng Y (2020) Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods. Inf Syst 91:101494","journal-title":"Inf Syst"},{"key":"1672_CR102","doi-asserted-by":"publisher","first-page":"14753","DOI":"10.1007\/s00521-020-04830-w","volume":"32","author":"S Mahdavifar","year":"2020","unstructured":"Mahdavifar S, Ghorbani AA (2020) DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Comput Appl 32:14753\u201314780","journal-title":"Neural Comput Appl"},{"issue":"3","key":"1672_CR103","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1108\/JSIT-09-2017-0074","volume":"20","author":"K Nagaraj","year":"2018","unstructured":"Nagaraj K, Bhattacharjee B, Sridhar A, Sharvani G (2018) Detection of phishing websites using a novel twofold ensemble model. J Syst Inf Technol 20(3):321\u2013357. https:\/\/doi.org\/10.1108\/JSIT-09-2017-0074","journal-title":"J Syst Inf Technol"},{"key":"1672_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"GDLT Parra","year":"2020","unstructured":"Parra GDLT, Rad P, Choo KKR, Beebe N (2020) Detecting internet of things attacks using distributed deep learning. J Netw Comput Appl 163: https:\/\/doi.org\/10.1016\/j.jnca.2020.102662","journal-title":"J Netw Comput Appl"},{"key":"1672_CR105","first-page":"222","volume":"28","author":"S Phomkeona","year":"2020","unstructured":"Phomkeona S, Okamura K (2020) Zero-day malicious email investigation and detection using features with deep-learning approach. J Inf Process 28:222\u2013229","journal-title":"J Inf Process"},{"issue":"8","key":"1672_CR106","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"RS Rao","year":"2019","unstructured":"Rao RS, Pais AR (2019) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31(8):3851\u20133873","journal-title":"Neural Comput Appl"},{"key":"1672_CR107","doi-asserted-by":"publisher","first-page":"101084","DOI":"10.1016\/j.pmcj.2019.101084","volume":"60","author":"RS Rao","year":"2019","unstructured":"Rao RS, Vaishnavi T, Pais AR (2019) PhishDump: a multi-model ensemble based technique for the detection of phishing sites in mobile devices. Pervasive Mobile Comput 60:101084","journal-title":"Pervasive Mobile Comput"},{"issue":"3","key":"1672_CR108","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1080\/19393555.2018.1456577","volume":"27","author":"S Selvaganapathy","year":"2018","unstructured":"Selvaganapathy S, Nivaashini M, Natarajan H (2018) Deep belief network based detection and categorization of malicious URLs. Inf Secur J A Global Perspect 27(3):145\u2013161","journal-title":"Inf Secur J A Global Perspect"},{"issue":"6","key":"1672_CR109","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1080\/0952813X.2018.1467496","volume":"30","author":"C Sur","year":"2018","unstructured":"Sur C (2018) Ensemble one-vs-all learning technique with emphatic & rehearsal training for phishing email classification using psychology. J Exp Theor Artif Intell 30(6):733\u2013762","journal-title":"J Exp Theor Artif Intell"},{"issue":"3","key":"1672_CR110","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar R, Soman KP, Poornachandran P (2018) Detecting malicious domain names using deep learning approaches at scale. J Intell Fuzzy Syst 34(3):1355\u20131367","journal-title":"J Intell Fuzzy Syst"},{"issue":"06","key":"1672_CR111","doi-asserted-by":"publisher","first-page":"1960008","DOI":"10.1142\/S021821301960008X","volume":"28","author":"G Vrban\u010di\u010d","year":"2019","unstructured":"Vrban\u010di\u010d G, Fister I Jr, Podgorelec V (2019) Parameter setting for deep neural networks using swarm intelligence on phishing websites classification. Int J Artif Intell Tools 28(06):1960008","journal-title":"Int J Artif Intell Tools"},{"issue":"6","key":"1672_CR112","first-page":"971","volume":"21","author":"P Wanda","year":"2019","unstructured":"Wanda P, Jie HJ (2019) URLDeep: continuous prediction of malicious URL with dynamic deep learning in social networks. IJ Netw Secur 21(6):971\u2013978","journal-title":"IJ Netw Secur"},{"issue":"2","key":"1672_CR113","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3233\/JIFS-190455","volume":"38","author":"HH Wang","year":"2020","unstructured":"Wang HH, Tian SW, Yu L, Wang XX, Qi QS, Chen JH (2020) Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism. J Intell Fuzzy Syst 38(2):1929\u20131941","journal-title":"J Intell Fuzzy Syst"},{"issue":"19","key":"1672_CR114","doi-asserted-by":"publisher","first-page":"4258","DOI":"10.3390\/s19194258","volume":"19","author":"B Wei","year":"2019","unstructured":"Wei B, Hamad RA, Yang L, He X, Wang H, Gao B, Woo WL (2019) A deep-learning-driven light-weight phishing detection sensor. Sensors 19(19):4258","journal-title":"Sensors"},{"key":"1672_CR115","doi-asserted-by":"publisher","first-page":"107275","DOI":"10.1016\/j.comnet.2020.107275","volume":"178","author":"W Wei","year":"2020","unstructured":"Wei W, Ke Q, Nowak J, Korytkowski M, Scherer R, Wo\u017aniak M (2020) Accurate and fast URL phishing detector: a convolutional neural network approach. Comput Netw 178:107275","journal-title":"Comput Netw"},{"key":"1672_CR116","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.neunet.2020.02.013","volume":"125","author":"X Xiao","year":"2020","unstructured":"Xiao X, Zhang D, Hu G, Jiang Y, Xia S (2020) CNN-MHSA: a convolutional neural network and multi-head self-attention combined approach for detecting phishing websites. Neural Netw 125:303\u2013312","journal-title":"Neural Netw"},{"key":"1672_CR117","doi-asserted-by":"publisher","first-page":"15196","DOI":"10.1109\/ACCESS.2019.2892066","volume":"7","author":"P Yang","year":"2019","unstructured":"Yang P, Zhao G, Zeng P (2019) Phishing website detection based on multidimensional features driven by deep learning. IEEE Access 7:15196\u201315209","journal-title":"IEEE Access"},{"key":"1672_CR118","doi-asserted-by":"publisher","first-page":"29891","DOI":"10.1109\/ACCESS.2019.2895751","volume":"7","author":"W Yang","year":"2019","unstructured":"Yang W, Zuo W, Cui B (2019) Detecting malicious urls via a keyword-based convolutional gated-recurrent-unit neural network. IEEE Access 7:29891\u201329900","journal-title":"IEEE Access"},{"key":"1672_CR119","doi-asserted-by":"publisher","first-page":"73271","DOI":"10.1109\/ACCESS.2019.2920655","volume":"7","author":"E Zhu","year":"2019","unstructured":"Zhu E, Chen Y, Ye C, Li X, Liu F (2019) OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7:73271\u201373284","journal-title":"IEEE Access"},{"key":"1672_CR120","doi-asserted-by":"publisher","first-page":"106505","DOI":"10.1016\/j.asoc.2020.106505","volume":"95","author":"E Zhu","year":"2020","unstructured":"Zhu E, Ju Y, Chen Z, Liu F, Fang X (2020) DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features. Appl Soft Comput 95:106505","journal-title":"Appl Soft Comput"},{"key":"1672_CR121","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05041-z","author":"H Zhu","year":"2020","unstructured":"Zhu H (2020) Online meta-learning firewall to prevent phishing attacks. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-05041-z","journal-title":"Neural Comput Appl"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-022-01672-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-022-01672-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-022-01672-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:04:00Z","timestamp":1744200240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-022-01672-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":121,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1672"],"URL":"https:\/\/doi.org\/10.1007\/s10115-022-01672-x","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"23 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}