{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:44:26Z","timestamp":1777373066717,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T00:00:00Z","timestamp":1519776000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12652-018-0736-0","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T00:52:07Z","timestamp":1519779127000},"page":"2593-2606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["CBR-PDS: a case-based reasoning phishing detection system"],"prefix":"10.1007","volume":"10","author":[{"given":"Hassan","family":"Abutair","sequence":"first","affiliation":[]},{"given":"Abdelfettah","family":"Belghith","sequence":"additional","affiliation":[]},{"given":"Saad","family":"AlAhmadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,28]]},"reference":[{"key":"736_CR1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A Aamodt","year":"1994","unstructured":"Aamodt A, Plaza E (1994) Case-based reasoning: foundational issues, methodological variations, and system approaches. AI Commun 7:39\u201359","journal-title":"AI Commun"},{"key":"736_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. In: Proceedings of the anti-phishing working group, 2nd annual eCrime researchers summit, pp 60\u201369","DOI":"10.1145\/1299015.1299021"},{"key":"736_CR3","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.procs.2017.06.131","volume":"110","author":"HYA Abutair","year":"2017","unstructured":"Abutair HYA, Belghith A (2017a) A multi-agent case-based reasoning architecture for phishing detection. Elsevier Procedia Comput Sci 110:492\u2013497","journal-title":"Elsevier Procedia Comput Sci"},{"key":"736_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.procs.2017.05.352","volume":"109","author":"HYA Abutair","year":"2017","unstructured":"Abutair HYA, Belghith A (2017b) Using case-based reasoning for phishing detection. Elsevier Procedia Comput Sci 109:281\u2013288","journal-title":"Elsevier Procedia Comput Sci"},{"key":"736_CR5","unstructured":"Aitken S (2017) Aiai cbr shell. In: Artificial intelligence applications institute. http:\/\/www.aiai.ed.ac.uk\/project\/cbr\/CBRDistrib\/ . Accessed 15 Oct 2017"},{"key":"736_CR6","volume-title":"DNS and BIND","author":"P Albitz","year":"2009","unstructured":"Albitz P, Liu C (2009) DNS and BIND, 5th edn. O\u2019Reilly Media, Newton","edition":"5"},{"key":"736_CR7","first-page":"1","volume":"11","author":"TA Alhaj","year":"2017","unstructured":"Alhaj TA, Siraj A, Zainal, MM, Elshoush HT, Elhaj F (2017) Feature selection using information gain for improved structural-based alert correlation. PloS one 11:1\u201318","journal-title":"PloS one"},{"key":"736_CR8","unstructured":"Amiri I, Akanbi O, Fazeldehkordi E (2015) A machine-Learning approach to phishing detection and defense. Elsevier. ISBN: 978-0-12-802927-5. https:\/\/www.sciencedirect.com\/science\/book\/9780128029275"},{"key":"736_CR9","volume-title":"Detection of phishing attacks: a machine learning approach. Industry studies in fuzziness and soft computing","author":"R Basnet","year":"2008","unstructured":"Basnet R, Basnet R, Mukkamala S, Sung AH (2008) Detection of phishing attacks: a machine learning approach. Industry studies in fuzziness and soft computing, vol 226. Springer, Berlin"},{"key":"736_CR10","unstructured":"Basnet RB, Doleck T (2015) Towards developing a tool to detect phishing urls: a machine learning approach. In: IEEE international conference on computational intelligence and communication technology (CICT\u201915), pp 220\u2013223"},{"key":"736_CR11","volume-title":"Feature selection for improved phishing detection. IEA\/AIE 2012. Lecture Notes in Computer Science","author":"RB Basnet","year":"2012","unstructured":"Basnet RB, Sung AH, Liu Q (2012) Feature selection for improved phishing detection. IEA\/AIE 2012. Lecture Notes in Computer Science, vol 7345. Springer, Berlin"},{"key":"736_CR12","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1017\/S0269888906000555","volume":"20","author":"R Bergmann","year":"2005","unstructured":"Bergmann R, Kolodner J, Plaza E (2005) Representation in case-based reasoning. Knowl Eng Rev 20:209\u2013213","journal-title":"Knowl Eng Rev"},{"key":"736_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332","journal-title":"Mach Learn"},{"key":"736_CR14","first-page":"247","volume":"10","author":"JA Chaudhry","year":"2016","unstructured":"Chaudhry JA, Chaudhry SA, Rittenhouse RG (2016) Phishing attacks and defenses. Int J Secur Appl 10:247\u2013256","journal-title":"Int J Secur Appl"},{"key":"736_CR15","doi-asserted-by":"crossref","unstructured":"Cohen WW (1995) Fast effective rule induction. In: Proceedings of the twelfth international conference on machine learning, pp 115\u2013123, Morgan Kaufmann, Burlington","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"736_CR16","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support vector networks. Mach Learn 20:273\u2013297","journal-title":"Mach Learn"},{"key":"736_CR17","unstructured":"Dunham K (2009) Mobile malware attacks and defense. Elsevier. ISBN: 978-1-59749-298-0. https:\/\/www.sciencedirect.com\/science\/book\/9781597492980"},{"key":"736_CR18","volume-title":"Introduction to evolutionary computing (Natural Computing Series)","author":"AE Eiben","year":"2010","unstructured":"Eiben AE, Smith JE (2010) Introduction to evolutionary computing (Natural Computing Series). Springer, Berlin"},{"key":"736_CR19","unstructured":"Frank E, Witten IH (1998) Generating accurate rule sets without global optimization. In: Hamilton: computer science, University of Waikato"},{"key":"736_CR20","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/LGRS.2014.2337320","volume":"12","author":"P Ghamisi","year":"2015","unstructured":"Ghamisi P, Benediktsson JA (2015) Feature selection based on hybridization of genetic algorithm and particle swarm optimization. IEEE Geosci Rem Sens Lett 12:309\u2013313","journal-title":"IEEE Geosci Rem Sens Lett"},{"key":"736_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M et al (2009) The weka data mining software: an update. ACM SIGKDD Explor Newsl 11:10\u201318","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"736_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JITR.2015070101","volume":"8","author":"NM Hewahi","year":"2015","unstructured":"Hewahi NM, Alashqar EA (2015) Wrapper feature selection based on genetic algorithm for recognizing objects from satellite imagery. J Inf Technol Res 8:1\u201320","journal-title":"J Inf Technol Res"},{"key":"736_CR23","doi-asserted-by":"publisher","first-page":"921","DOI":"10.3923\/itj.2012.921.925","volume":"11","author":"H Huang","year":"2012","unstructured":"Huang H, Qian L, Wang Y (2012) A svm-based technique to detect phishing urls. Inf Technol J 11:921\u2013925","journal-title":"Inf Technol J"},{"key":"736_CR24","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.eswa.2017.04.017","volume":"82","author":"S Jiang","year":"2017","unstructured":"Jiang S, Chin KS, Wang L, Qu G, Tsui KL (2017) Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department. Expert Syst Appl 82:216\u2013230","journal-title":"Expert Syst Appl"},{"key":"736_CR25","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15:2091\u20132121","journal-title":"IEEE Commun Surv Tutor"},{"key":"736_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"59","author":"N Landwehr","year":"2005","unstructured":"Landwehr N, Hall M, Frank E (2005) Logistic model trees. Mach Learn 59:161\u2013205","journal-title":"Mach Learn"},{"key":"736_CR27","doi-asserted-by":"crossref","unstructured":"Liu G, Qiu B, Wenyin L (2010) Automatic detection of phishing target from phishing webpage. In: Proceedings of the 20th international conference on pattern recognition (ICPR\u201910), pp 4153\u20134156","DOI":"10.1109\/ICPR.2010.1010"},{"key":"736_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s12652-015-0310-y","volume":"7","author":"Z Liu","year":"2016","unstructured":"Liu Z, Wang R, Tao M (2016) Smoteadanl: a learning method for network traffic classification. J Ambient Intell Hum Comput 7:121\u2013130","journal-title":"J Ambient Intell Hum Comput"},{"key":"736_CR29","unstructured":"Marchal S (2015) Analyse du dns et analyse smantique pour la dtection de l\u2019hameonnage. Ph.D. Dissertation, pp 1\u20135, University of Lorraine, France"},{"key":"736_CR30","doi-asserted-by":"crossref","unstructured":"Marchal S, Franois J, State R, Engel T (2014a) Phishscore: Hacking phishers\u2019 minds. In: Proceedings of the international conference on network and service management (CNSM\u201914), pp 46\u201354","DOI":"10.1109\/CNSM.2014.7014140"},{"key":"736_CR31","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TNSM.2014.2377295","volume":"11","author":"S Marchal","year":"2014","unstructured":"Marchal S, Franois J, State R, EngelMoghimi T (2014b) Phishstorm: detecting phishing with streaming analytics. IEEE Trans Netw Serv Manag 11:458\u2013471","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"736_CR32","first-page":"539","volume-title":"Advances in neuro-information processing. ICONIP 2008. Lecture Notes in Computer Science","author":"D Miyamoto","year":"2009","unstructured":"Miyamoto D, Hazeyama H, Kadobayashi Y (2009) An evaluation of machine learning-based methods for detection of phishing sites. In: Kppen M, Kasabov N, Coghill G (eds) Advances in neuro-information processing. ICONIP 2008. Lecture Notes in Computer Science, vol 5506. Springer, Berlin, pp 539\u2013546"},{"key":"736_CR33","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi M, Varjani AY (2016) New rule-based phishing detection method. Expert Syst Appl 53:231\u2013242","journal-title":"Expert Syst Appl"},{"key":"736_CR34","unstructured":"Murphy C, Kaiser GE (2008) Improving the dependability of machine learning applications. In: Research Report, Department of Computer Science, Columbia University, NY, USA"},{"key":"736_CR35","first-page":"21","volume-title":"Toward optimal feature selection using ranking methods and classification algorithms","author":"J Novakovic","year":"2016","unstructured":"Novakovic J (2016) Toward optimal feature selection using ranking methods and classification algorithms. Yugoslav J Oper Res 21(1)"},{"key":"736_CR36","unstructured":"Obitko M (2017) Introduction to genetic algorithms. In: http:\/\/obitko.com\/tutorials\/genetic-algorithms\/ . Accessed 15 Oct 2017"},{"key":"736_CR37","first-page":"539","volume-title":"Advances in neuro-information processing. ICONIP 2008. Lecture Notes in Computer Science","author":"KI Pradeepth","year":"2009","unstructured":"Pradeepth KI, Kannan A (2009) Performance study of classification techniques for phishing url detection. In: Kppen M, Kasabov N, Coghill G (eds) Advances in neuro-information processing. ICONIP 2008. Lecture Notes in Computer Science, vol 5506. Springer, Berlin, pp 539\u2013546"},{"key":"736_CR38","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, Burlington"},{"key":"736_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2015.01.015","volume":"41","author":"ER Reyes","year":"2015","unstructured":"Reyes ER, Negny S, Robles GC, Le Lann JM (2015) Improvement of online adaptation knowledge acquisition and reuse in case-based reasoning: application to process engineering design. Eng Appl Artif Intell 41:1\u201316","journal-title":"Eng Appl Artif Intell"},{"key":"736_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40167-1","volume-title":"Case-based reasoning: a textbook","author":"MM Richter","year":"2013","unstructured":"Richter MM, Weber R (2013) Case-based reasoning: a textbook. Sringer, Berlin"},{"key":"736_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24211-8_3","volume-title":"Genetic algorithms for subset selection in model-based clustering","author":"L Scrucca","year":"2016","unstructured":"Scrucca L (2016) Genetic algorithms for subset selection in model-based clustering. Springer, Berlin"},{"key":"736_CR42","unstructured":"Sumner M, Hall M, Frank E (2005) Greedy attribute selection. In: Jorge A, Torgo L, Brazdil P, Camacho R, Gama J (eds) PKDD\u201905. Lecture notes in computer science, vol 3721. Springer, Berlin, Heidelberg, 675\u2013683, Morgan Kaufmann, Burlington"},{"key":"736_CR43","unstructured":"Tan CL, Chiew KL (2014) Phishing website detection using url-assisted brand name weighting system. In: Proceedings of the international symposium on intelligent signal processing and communication systems (ISPACS\u201914), pp 054\u2013059"},{"key":"736_CR44","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TEVC.2015.2504420","volume":"20","author":"B Xue","year":"2016","unstructured":"Xue B, Zhang M, Browne WN, Yao X (2016) A survey on evolutionary computation approaches to feature selection. IEEE Trans Evol Comput 20:606\u2013626","journal-title":"IEEE Trans Evol Comput"},{"key":"736_CR45","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s12652-016-0412-1","volume":"8","author":"N Yala","year":"2017","unstructured":"Yala N, Fergani B, Fleury A (2017) Towards improving feature extraction and classification for activity recognition on streaming data. J Ambient Intell Hum Comput 8:177\u2013189","journal-title":"J Ambient Intell Hum Comput"},{"issue":"2","key":"736_CR46","first-page":"188","volume":"81","author":"H Zuhair","year":"2015","unstructured":"Zuhair H, Selamat A, Salleh M (2015) Selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. J Theor Appl Inf Technol 81(2):188\u2013205","journal-title":"J Theor Appl Inf Technol"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0736-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0736-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0736-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T20:17:02Z","timestamp":1603916222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0736-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,28]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["736"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0736-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,28]]},"assertion":[{"value":"5 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}