{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:55:41Z","timestamp":1773654941155,"version":"3.50.1"},"reference-count":45,"publisher":"Oxford University Press (OUP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,1]]},"DOI":"10.1093\/comjnl\/bxx035","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:39:32Z","timestamp":1490373572000},"page":"1745-1759","source":"Crossref","is-referenced-by-count":47,"title":["Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering"],"prefix":"10.1093","volume":"60","author":[{"given":"El-Sayed M","family":"El-Alfy","sequence":"first","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"key\n\t\t\t\t20171208024716_bxx035C1","volume-title":"Improving Information Security Practices through Computational Intelligence","year":"2015"},{"key":"key\n\t\t\t\t20171208024716_bxx035C2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From information security to cyber security","volume":"38","year":"2013","journal-title":"Comput. Secur."},{"key":"key\n\t\t\t\t20171208024716_bxx035C3","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","article-title":"Phishing detection: a literature survey","volume":"15","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"key\n\t\t\t\t20171208024716_bxx035C4","volume-title":"Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft","year":"2007"},{"key":"key\n\t\t\t\t20171208024716_bxx035C5","first-page":"1","article-title":"Fighting against phishing attacks: state of the art and future challenges","volume":"First Online","year":"2016","journal-title":"Neural Comput. Appl."},{"key":"key\n\t\t\t\t20171208024716_bxx035C6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","article-title":"Probabilistic neural networks","volume":"3","year":"1990","journal-title":"Neural Netw."},{"key":"key\n\t\t\t\t20171208024716_bxx035C7","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/83.841516","article-title":"Fast and memory efficient implementation of the exact pnn","volume":"9","year":"2000","journal-title":"IEEE Trans. Image Process."},{"key":"key\n\t\t\t\t20171208024716_bxx035C8","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","article-title":"A survey of phishing email filtering techniques","volume":"15","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"key\n\t\t\t\t20171208024716_bxx035C9","doi-asserted-by":"crossref","first-page":"119","DOI":"10.4156\/jdcta.vol6.issue18.14","article-title":"A survey of learning based techniques of phishing email filtering","volume":"6","year":"2012","journal-title":"Int. J. Digit. Content Technol. Appl."},{"key":"key\n\t\t\t\t20171208024716_bxx035C10","year":"2007"},{"key":"key\n\t\t\t\t20171208024716_bxx035C11","year":"2011"},{"key":"key\n\t\t\t\t20171208024716_bxx035C12","year":"2012"},{"key":"key\n\t\t\t\t20171208024716_bxx035C13","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1016\/j.chb.2012.12.018","article-title":"A game design framework for avoiding phishing attacks","volume":"29","year":"2013","journal-title":"Comput. Hum. Behav."},{"key":"key\n\t\t\t\t20171208024716_bxx035C14","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"key\n\t\t\t\t20171208024716_bxx035C15","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.chb.2016.02.065","article-title":"Phishing threat avoidance behaviour: an empirical investigation","volume":"60","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"key\n\t\t\t\t20171208024716_bxx035C16","year":"2016"},{"key":"key\n\t\t\t\t20171208024716_bxx035C17","first-page":"394","article-title":"Understanding security behaviors in personal computer usage: A threat avoidance perspective","volume":"11","year":"2010","journal-title":"J. Assoc. Inf. Syst."},{"key":"key\n\t\t\t\t20171208024716_bxx035C18","year":"2008"},{"key":"key\n\t\t\t\t20171208024716_bxx035C19","year":"2010"},{"key":"key\n\t\t\t\t20171208024716_bxx035C20","first-page":"278","article-title":"Browser blacklists: the Utopia of phishing protection","volume":"554","year":"2015","journal-title":"Commun. Comput. Inf. Sci."},{"key":"key\n\t\t\t\t20171208024716_bxx035C21","year":"2007"},{"key":"key\n\t\t\t\t20171208024716_bxx035C22","year":"2008"},{"key":"key\n\t\t\t\t20171208024716_bxx035C23","year":"2008"},{"key":"key\n\t\t\t\t20171208024716_bxx035C24","year":"2012"},{"key":"key\n\t\t\t\t20171208024716_bxx035C25","year":"2014"},{"key":"key\n\t\t\t\t20171208024716_bxx035C26","year":"2009"},{"key":"key\n\t\t\t\t20171208024716_bxx035C27","year":"2008"},{"key":"key\n\t\t\t\t20171208024716_bxx035C28","first-page":"147","article-title":"Phishshield: a desktop application to detect phishing webpages through heuristic approach","year":"2015","journal-title":"Proced. Comput. Sci."},{"key":"key\n\t\t\t\t20171208024716_bxx035C29","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/978-3-642-02490-0_66","article-title":"An evaluation of machine learning-based methods for detection of phishing sites","volume":"5506","year":"2009","journal-title":"Lecture Notes in Computer Science, LNCS"},{"key":"key\n\t\t\t\t20171208024716_bxx035C30","year":"2009"},{"key":"key\n\t\t\t\t20171208024716_bxx035C31","year":"2009"},{"key":"key\n\t\t\t\t20171208024716_bxx035C32","first-page":"147","article-title":"Feature selection for phishing detection: a review of research","volume":"15","year":"2016","journal-title":"Int. J. Intell. Syst. Technol. Appl."},{"key":"key\n\t\t\t\t20171208024716_bxx035C33","year":"2012"},{"key":"key\n\t\t\t\t20171208024716_bxx035C34","year":"2013"},{"key":"key\n\t\t\t\t20171208024716_bxx035C35","year":"2013"},{"key":"key\n\t\t\t\t20171208024716_bxx035C36","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","article-title":"Predicting phishing websites based on self-structuring neural network","volume":"25","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"key\n\t\t\t\t20171208024716_bxx035C37","year":"2016"},{"key":"key\n\t\t\t\t20171208024716_bxx035C38","year":"2016"},{"key":"key\n\t\t\t\t20171208024716_bxx035C39","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","year":"2009"},{"key":"key\n\t\t\t\t20171208024716_bxx035C40","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1002\/9780470316801.ch2","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","year":"1990"},{"key":"key\n\t\t\t\t20171208024716_bxx035C41","doi-asserted-by":"crossref","first-page":"3336","DOI":"10.1016\/j.eswa.2008.01.039","article-title":"A simple and fast algorithm for k-medoids clustering","volume":"36","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"key\n\t\t\t\t20171208024716_bxx035C42","year":"1988"},{"key":"key\n\t\t\t\t20171208024716_bxx035C43","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/S0925-2312(97)00063-5","article-title":"Constructive training of probabilistic neural networks","volume":"19","year":"1998","journal-title":"Neurocomputing"},{"key":"key\n\t\t\t\t20171208024716_bxx035C44","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","article-title":"Intelligent rule-based phishing websites classification","volume":"8","year":"2014","journal-title":"IET Inf. Secur."},{"key":"key\n\t\t\t\t20171208024716_bxx035C45","author":"Mathworks","year":"2016"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/12\/1745\/22297461\/bxx035.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T02:47:27Z","timestamp":1512701247000},"score":1,"resource":{"primary":{"URL":"http:\/\/academic.oup.com\/comjnl\/article\/60\/12\/1745\/3738789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":45,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,4,18]]},"published-print":{"date-parts":[[2017,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx035","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2017,12]]},"published":{"date-parts":[[2017,4,18]]}}}