{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:35:26Z","timestamp":1772004926497,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12652-021-03405-4","type":"journal-article","created":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T03:27:36Z","timestamp":1626924456000},"page":"1951-1975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9377-5689","authenticated-orcid":false,"given":"S.","family":"Priya","sequence":"first","affiliation":[]},{"given":"S.","family":"Selvakumar","sequence":"additional","affiliation":[]},{"given":"R. Leela","family":"Velusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"issue":"1","key":"3405_CR1","first-page":"29","volume":"11","author":"N Abdelhamid","year":"2015","unstructured":"Abdelhamid N (2015) Multi-label rules for phishing classification. Appl Comput Inf 11(1):29\u201346","journal-title":"Appl Comput Inf"},{"issue":"13","key":"3405_CR2","doi-asserted-by":"crossref","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamid","year":"2014","unstructured":"Abdelhamid N, Ayesh A, Thabtah F (2014) Phishing detection based associative classification data mining. Expert Syst Appl 41(13):5948\u20135959","journal-title":"Expert Syst Appl"},{"issue":"7","key":"3405_CR3","doi-asserted-by":"crossref","first-page":"2593","DOI":"10.1007\/s12652-018-0736-0","volume":"10","author":"H Abutair","year":"2019","unstructured":"Abutair H, Belghith A, AlAhmadi S (2019) Cbr-pds: a case-based reasoning phishing detection system. J Ambient Intell Hum Comput 10(7):2593\u20132606","journal-title":"J Ambient Intell Hum Comput"},{"key":"3405_CR4","doi-asserted-by":"crossref","unstructured":"Adeyemo VE, Balogun AO, Mojeed HA, Akande NO, Adewole KS (2020) Ensemble-based logistic model trees for website phishing detection. In: International conference on advances in cyber security, Springer, pp 627\u2013641","DOI":"10.1007\/978-981-33-6835-4_41"},{"key":"3405_CR5","doi-asserted-by":"crossref","unstructured":"Afroz S, Greenstadt R (2011) Phishzoo: detecting phishing websites by looking at them. In: 2011 IEEE fifth international conference on semantic computing, IEEE, pp 368\u2013375","DOI":"10.1109\/ICSC.2011.52"},{"issue":"4","key":"3405_CR6","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","volume":"15","author":"A Almomani","year":"2013","unstructured":"Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15(4):2070\u20132090","journal-title":"IEEE Commun Surv Tutor"},{"issue":"12","key":"3405_CR7","doi-asserted-by":"crossref","first-page":"10459","DOI":"10.1007\/s13369-020-04802-1","volume":"45","author":"YA Alsariera","year":"2020","unstructured":"Alsariera YA, Elijah AV, Balogun AO (2020) Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations. Arab J Sci Eng 45(12):10459\u201310470","journal-title":"Arab J Sci Eng"},{"key":"3405_CR8","unstructured":"APWG (2020) Anti phishing working group report https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q2_2020.pdf. Accessed 30 Apr 2021"},{"issue":"12","key":"3405_CR9","doi-asserted-by":"crossref","first-page":"4315","DOI":"10.1007\/s00500-018-3084-2","volume":"23","author":"M Babagoli","year":"2019","unstructured":"Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23(12):4315\u20134327","journal-title":"Soft Comput"},{"key":"3405_CR10","unstructured":"Beale MH, Hagan MT, Demuth HB (1992) Neural network toolbox user\u2019s guide. The MathWorks Inc, p 103"},{"key":"3405_CR11","doi-asserted-by":"crossref","unstructured":"Bell S, Komisarczuk P (2020) An analysis of phishing blacklists: Google safe browsing, openphish, and phishtank. In: Proceedings of the Australasian Computer Science Week Multiconference, pp 1\u201311","DOI":"10.1145\/3373017.3373020"},{"issue":"1","key":"3405_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0962492900002518","volume":"4","author":"PT Boggs","year":"1995","unstructured":"Boggs PT, Tolle JW (1995) Sequential quadratic programming. Acta Numer 4(1):1\u201351","journal-title":"Acta Numer"},{"key":"3405_CR13","doi-asserted-by":"crossref","first-page":"122103","DOI":"10.1016\/j.biortech.2019.122103","volume":"293","author":"Y Chen","year":"2019","unstructured":"Chen Y, Yu G, Long Y, Teng J, You X, Liao BQ, Lin H (2019) Application of radial basis function artificial neural network to quantify interfacial energies related to membrane fouling in a membrane bioreactor. Biores Technol 293:122103","journal-title":"Biores Technol"},{"key":"3405_CR14","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew KL, Tan CL, Wong K, Yong KS, Tiong WK (2019) A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf Sci 484:153\u2013166","journal-title":"Inf Sci"},{"key":"3405_CR15","unstructured":"Dataset (2016) Uci machine learning repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/website+phishing. Accessed 30 Mar 2020"},{"issue":"2","key":"3405_CR16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/3468.833094","volume":"30","author":"T Denoeux","year":"2000","unstructured":"Denoeux T (2000) A neural network classifier based on dempster-shafer theory. IEEE Trans Syst Man Cybern Part A Syst Hum 30(2):131\u2013150","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Hum"},{"key":"3405_CR17","unstructured":"Directory (2019) Starting point directory. http:\/\/www.stpt.com. Accessed 30 Jul 2019"},{"key":"3405_CR18","unstructured":"Eberhart R, Kennedy J (1995) Particle swarm optimization. In: Proceedings of the IEEE international conference on neural networks, Citeseer, vol 4, pp 1942\u20131948"},{"issue":"12","key":"3405_CR19","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1093\/comjnl\/bxx035","volume":"60","author":"ESM El-Alfy","year":"2017","unstructured":"El-Alfy ESM (2017) Detection of phishing websites based on probabilistic neural networks and k-medoids clustering. Comput J 60(12):1745\u20131759","journal-title":"Comput J"},{"key":"3405_CR20","first-page":"1","volume":"2018","author":"F Feng","year":"2018","unstructured":"Feng F, Zhou Q, Shen Z, Yang X, Han L, Wang J (2018) The application of a novel neural network in the detection of phishing websites. J Ambient Intell Hum Comput 2018:1\u201315","journal-title":"J Ambient Intell Hum Comput"},{"issue":"3","key":"3405_CR21","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s00500-012-0923-4","volume":"17","author":"F Fern\u00e1ndez-Navarro","year":"2013","unstructured":"Fern\u00e1ndez-Navarro F, Herv\u00e1s-Mart\u00ednez C, Guti\u00e9rrez PA (2013) Generalised gaussian radial basis function neural networks. Soft Comput 17(3):519\u2013533","journal-title":"Soft Comput"},{"key":"3405_CR22","doi-asserted-by":"crossref","unstructured":"Fong S, Biuk-Aghai RP, Millham RC (2018) Swarm search methods in weka for data mining. In: Proceedings of the 2018 10th international conference on machine learning and computing, pp 122\u2013127","DOI":"10.1145\/3195106.3195167"},{"key":"3405_CR23","doi-asserted-by":"crossref","unstructured":"Frank E, Hall M, Holmes G, Kirkby R, Pfahringer B, Witten IH, Trigg L (2009) Weka-a machine learning workbench for data mining. In: Data mining and knowledge discovery handbook. Springer, pp 1269\u20131277","DOI":"10.1007\/978-0-387-09823-4_66"},{"issue":"2","key":"3405_CR24","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1016\/j.eswa.2007.11.045","volume":"36","author":"G Gan","year":"2009","unstructured":"Gan G, Wu J, Yang Z (2009) A genetic fuzzy k-modes algorithm for clustering categorical data. Expert Syst Appl 36(2):1615\u20131620","journal-title":"Expert Syst Appl"},{"key":"3405_CR25","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","volume":"73","author":"D Goel","year":"2018","unstructured":"Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput Secur 73:519\u2013544","journal-title":"Comput Secur"},{"key":"3405_CR26","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/0378-3758(86)90085-6","volume":"15","author":"S Guiasu","year":"1986","unstructured":"Guiasu S (1986) Grouping data by using the weighted entropy. J Stat Plan Inference 15:63\u201369","journal-title":"J Stat Plan Inference"},{"issue":"2","key":"3405_CR27","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11235-017-0334-z","volume":"67","author":"BB Gupta","year":"2018","unstructured":"Gupta BB, Arachchilage NA, Psannis KE (2018) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67(2):247\u2013267","journal-title":"Telecommun Syst"},{"key":"3405_CR28","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1016\/j.asoc.2016.08.005","volume":"48","author":"W Hadi","year":"2016","unstructured":"Hadi W, Aburub F, Alhawari S (2016) A new fast associative classification algorithm for detecting phishing websites. Appl Soft Comput 48:729\u2013734","journal-title":"Appl Soft Comput"},{"issue":"3","key":"3405_CR29","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1009769707641","volume":"2","author":"Z Huang","year":"1998","unstructured":"Huang Z (1998) Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min Knowl Disc 2(3):283\u2013304","journal-title":"Data Min Knowl Disc"},{"issue":"4","key":"3405_CR30","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/91.784206","volume":"7","author":"Z Huang","year":"1999","unstructured":"Huang Z, Ng MK (1999) A fuzzy k-modes algorithm for clustering categorical data. IEEE Trans Fuzzy Syst 7(4):446\u2013452","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"3405_CR32","first-page":"398","volume":"10","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018a) Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation. Int J Inf Comput Secur 10(4):398\u2013417","journal-title":"Int J Inf Comput Secur"},{"issue":"4","key":"3405_CR33","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11235-017-0414-0","volume":"68","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018b) Towards detection of phishing websites on client-side using machine learning based approach. Telecommun Syst 68(4):687\u2013700","journal-title":"Telecommun Syst"},{"issue":"6","key":"3405_CR34","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1007\/s12652-017-0616-z","volume":"9","author":"AK Jain","year":"2018","unstructured":"Jain AK, Gupta BB (2018c) Two-level authentication approach to protect from phishing attacks in real time. J Ambient Intell Hum Comput 9(6):1783\u20131796","journal-title":"J Ambient Intell Hum Comput"},{"issue":"5","key":"3405_CR35","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"AK Jain","year":"2019","unstructured":"Jain AK, Gupta BB (2019) A machine learning based approach for phishing detection using hyperlinks information. J Ambient Intell Hum Comput 10(5):2015\u20132028","journal-title":"J Ambient Intell Hum Comput"},{"key":"3405_CR31","doi-asserted-by":"crossref","unstructured":"Jain AK, Gupta B (2021) A survey of phishing attack techniques, defence mechanisms and open research challenges. In: Enterprise Information Systems, pp 1\u201339","DOI":"10.1080\/17517575.2021.1896786"},{"issue":"1","key":"3405_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-016-0060-7","volume":"6","author":"SC Jeeva","year":"2016","unstructured":"Jeeva SC, Rajsingh EB (2016) Intelligent phishing url detection using association rule mining. Hum-Centr Computi Inf Sci 6(1):1\u201319","journal-title":"Hum-Centr Computi Inf Sci"},{"key":"3405_CR37","unstructured":"Kaspersky (2020) Kaspersky lab report. https:\/\/securelist.com\/spam-and-phishing-in-q2-2020\/97987\/. Accessed 30 Oct 2020"},{"key":"3405_CR38","doi-asserted-by":"crossref","unstructured":"Khan SA, Khan W, Hussain A (2020) Phishing attacks and websites classification using machine learning and multiple datasets (a comparative analysis). In: International conference on intelligent computing. Springer, pp 301\u2013313","DOI":"10.1007\/978-3-030-60796-8_26"},{"key":"3405_CR39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","volume":"94","author":"Y Li","year":"2019","unstructured":"Li Y, Yang Z, Chen X, Yuan H, Liu W (2019) A stacking model using url and html features for phishing webpage detection. Futur Gener Comput Syst 94:27\u201339","journal-title":"Futur Gener Comput Syst"},{"key":"3405_CR40","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2012) An assessment of features related to phishing websites using an automated technique. In: 2012 International conference for internet technology and secured transactions, IEEE, pp 492\u2013497"},{"issue":"5","key":"3405_CR41","first-page":"817","volume":"15","author":"V Muppavarapu","year":"2018","unstructured":"Muppavarapu V, Rajendran A, Vasudevan SK (2018) Phishing detection using rdf and random forests. Int Arab J Inf Technol 15(5):817\u2013824","journal-title":"Int Arab J Inf Technol"},{"issue":"4","key":"3405_CR42","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0893-6080(05)80038-3","volume":"5","author":"MT Musavi","year":"1992","unstructured":"Musavi MT, Ahmed W, Chan KH, Faris KB, Hummels DM (1992) On the training of radial basis function classifiers. Neural Netw 5(4):595\u2013603","journal-title":"Neural Netw"},{"key":"3405_CR43","unstructured":"PhishTank (2019) Phishtank repository http:\/\/phishtank.com. Accessed 30 Jul 2019"},{"key":"3405_CR44","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ijar.2015.12.012","volume":"72","author":"F Pichon","year":"2016","unstructured":"Pichon F, Mercier D, Lefevre \u00c9, Delmotte F (2016) Proposition and learning of some belief function contextual correction mechanisms. Int J Approx Reason 72:4\u201342","journal-title":"Int J Approx Reason"},{"key":"3405_CR45","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.asoc.2014.03.039","volume":"21","author":"AP Piotrowski","year":"2014","unstructured":"Piotrowski AP (2014) Differential evolution algorithms applied to neural network training suffer from stagnation. Appl Soft Comput 21:382\u2013406","journal-title":"Appl Soft Comput"},{"issue":"12","key":"3405_CR46","doi-asserted-by":"crossref","first-page":"2458","DOI":"10.1109\/TNNLS.2015.2497286","volume":"27","author":"J Raitoharju","year":"2015","unstructured":"Raitoharju J, Kiranyaz S, Gabbouj M (2015) Training radial basis function neural networks for classification via class-specific clustering. IEEE Trans Neural Netw Learn Syst 27(12):2458\u20132471","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3405_CR47","first-page":"75","volume":"35","author":"G Ramesh","year":"2017","unstructured":"Ramesh G, Gupta J, Gamya P (2017) Identification of phishing webpages and its target domains by analyzing the feign relationship. J Inf Secur Appl 35:75\u201384","journal-title":"J Inf Secur Appl"},{"key":"3405_CR48","first-page":"1","volume":"2019","author":"RS Rao","year":"2019","unstructured":"Rao RS, Pais AR (2019) Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. J Ambient Intell Hum Comput 2019:1\u201320","journal-title":"J Ambient Intell Hum Comput"},{"key":"3405_CR49","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.comcom.2019.11.047","volume":"153","author":"R Ravi","year":"2020","unstructured":"Ravi R et al (2020) A performance analysis of software defined network based prevention on phishing attack in cyberspace using a deep machine learning with cantina approach (dmlca). Comput Commun 153:375\u2013381","journal-title":"Comput Commun"},{"key":"3405_CR50","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) A mathematical theory of evidence, vol 42. Princeton University Press, Princeton"},{"issue":"2","key":"3405_CR51","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.ijar.2004.05.003","volume":"38","author":"P Smets","year":"2005","unstructured":"Smets P (2005) Decision making in the tbm: the necessity of the pignistic transformation. Int J Approx Reason 38(2):133\u2013147","journal-title":"Int J Approx Reason"},{"issue":"1","key":"3405_CR52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12046-020-01392-4","volume":"45","author":"M Somesha","year":"2020","unstructured":"Somesha M, Pais AR, Rao RS, Rathour VS (2020) Efficient deep learning techniques for the detection of phishing websites. S\u0101dhan\u0101 45(1):1\u201318","journal-title":"S\u0101dhan\u0101"},{"issue":"1","key":"3405_CR53","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"DF Specht","year":"1990","unstructured":"Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109\u2013118","journal-title":"Neural Netw"},{"issue":"4","key":"3405_CR54","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341\u2013359","journal-title":"J Glob Optim"},{"key":"3405_CR55","doi-asserted-by":"crossref","first-page":"101793","DOI":"10.1016\/j.cose.2020.101793","volume":"2020","author":"CL Tan","year":"2020","unstructured":"Tan CL, Chiew KL, Yong KS, Abdullah J, Sebastian Y et al (2020) A graph-theoretic approach for the detection of phishing webpages. Comput Secur 2020:101793","journal-title":"Comput Secur"},{"issue":"2","key":"3405_CR56","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/0004-3702(93)90072-J","volume":"61","author":"B Tessem","year":"1993","unstructured":"Tessem B et al (1993) Approximations for efficient computation in the theory of evidence. Artif Intell 61(2):315\u2013329","journal-title":"Artif Intell"},{"key":"3405_CR57","unstructured":"Tessian (2021) Tessian report. https:\/\/www.tessian.com\/blog\/phishing-statistics-2020\/. Accessed 16 Apr 2021"},{"key":"3405_CR58","unstructured":"Tool (2019) Domain age checker. http:\/\/www.bulkseotools.com\/bulk-check-domain-age.php. Accessed 3 Aug 2019"},{"key":"3405_CR59","unstructured":"Tracker (2019) Seo tool. https:\/\/smallseotools.com. Accessed 30 Aug 2019"},{"key":"3405_CR60","unstructured":"Weng L, Zhang H, Chen H, Song Z, Hsieh CJ, Daniel L, Boning D, Dhillon I (2018) Towards fast computation of certified robustness for relu networks. In: International conference on machine learning, PMLR, pp 5276\u20135285"},{"key":"3405_CR61","unstructured":"WHOIS (2019) Whois data query tool. https:\/\/www.whoisxmlapi.com. Accessed 17 Aug 2019"},{"key":"3405_CR62","first-page":"5","volume":"2012","author":"Y Wu","year":"2012","unstructured":"Wu Y, Wang H, Zhang B, Du KL (2012) Using radial basis function networks for function approximation and classification. Int Schol Res Not 2012:5","journal-title":"Int Schol Res Not"},{"key":"3405_CR63","doi-asserted-by":"crossref","unstructured":"Xie T, Yu H, Wilamowski B (2011) Comparison between traditional neural networks and radial basis function networks. In: 2011 IEEE international symposium on industrial electronics, IEEE, pp 1194\u20131199","DOI":"10.1109\/ISIE.2011.5984328"},{"key":"3405_CR64","doi-asserted-by":"crossref","unstructured":"Yang XS, Deb S (2009) Cuckoo search via l\u00e9vy flights. In: 2009 World congress on nature & biologically inspired computing (NaBIC), IEEE, pp 210\u2013214","DOI":"10.1109\/NABIC.2009.5393690"},{"issue":"4","key":"3405_CR65","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/S0893-6080(98)00024-0","volume":"11","author":"ZR Yang","year":"1998","unstructured":"Yang ZR, Chen S (1998) Robust maximum likelihood training of heteroscedastic probabilistic neural networks. Neural Netw 11(4):739\u2013747","journal-title":"Neural Netw"},{"key":"3405_CR66","doi-asserted-by":"crossref","first-page":"106505","DOI":"10.1016\/j.asoc.2020.106505","volume":"95","author":"E Zhu","year":"2020","unstructured":"Zhu E, Ju Y, Chen Z, Liu F, Fang X (2020) Dtof-ann: an artificial neural network phishing detection model based on decision tree and optimal features. Appl Soft Comput 95:106505","journal-title":"Appl Soft Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03405-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03405-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03405-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T16:55:04Z","timestamp":1677776104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03405-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,22]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["3405"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03405-4","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,22]]},"assertion":[{"value":"13 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}