{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:59:40Z","timestamp":1774540780614,"version":"3.50.1"},"reference-count":68,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T00:00:00Z","timestamp":1524614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy039","type":"journal-article","created":{"date-parts":[[2018,4,5]],"date-time":"2018-04-05T11:08:54Z","timestamp":1522926534000},"page":"1143-1157","source":"Crossref","is-referenced-by-count":60,"title":["SmiDCA: An Anti-Smishing Model with Machine Learning Approach"],"prefix":"10.1093","volume":"61","author":[{"given":"Gunikhan","family":"Sonowal","sequence":"first","affiliation":[{"name":"Department of Computer Science, Pondicherry University, Puducherry, India"}]},{"given":"K S","family":"Kuppusamy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Pondicherry University, Puducherry, India"}]}],"member":"286","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"key\n\t\t\t\t20180724122915_bxy039C1","author":"Michael","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C2","author":"Statisticbrain","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C3","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.eswa.2017.04.055","article-title":"Towards filtering undesired short text messages using an online learning approach with semantic indexing","volume":"83","author":"Silva","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"key\n\t\t\t\t20180724122915_bxy039C4","doi-asserted-by":"crossref","first-page":"e4163-n\/a","DOI":"10.1002\/cpe.4163","article-title":"Cnn-based malicious user detection in social networks","volume":"30","author":"Hong","year":"2018","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"key\n\t\t\t\t20180724122915_bxy039C5","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s11416-016-0270-6","article-title":"Blackhole attack: user identity and password seize attack using honeypot","volume":"12","author":"Mun","year":"2016","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"key\n\t\t\t\t20180724122915_bxy039C6","author":"Sonowal","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C7","author":"McAfee","year":"2012"},{"key":"key\n\t\t\t\t20180724122915_bxy039C8","author":"genisyscu","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C9","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.procs.2016.02.038","article-title":"Cellular network fraud & security, jamming attack and defenses","volume":"78","author":"Hiremath","year":"2016","journal-title":"Proc. Comput. Sci."},{"key":"key\n\t\t\t\t20180724122915_bxy039C10","author":"Clxcommunications","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C11","doi-asserted-by":"crossref","first-page":"9899","DOI":"10.1016\/j.eswa.2012.02.053","article-title":"Sms spam filtering: methods and data","volume":"39","author":"Delany","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"key\n\t\t\t\t20180724122915_bxy039C12","author":"Baglia","year":"2015"},{"key":"key\n\t\t\t\t20180724122915_bxy039C13","author":"Canova","year":"2015"},{"key":"key\n\t\t\t\t20180724122915_bxy039C14","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/978-3-642-41674-3_66","volume-title":"Advances in Computer Science and its Applications","author":"Kang","year":"2014"},{"key":"key\n\t\t\t\t20180724122915_bxy039C15","first-page":"206","article-title":"Mobile phishing attacks and mitigation techniques","volume":"6","author":"Shahriar","year":"2015","journal-title":"J. Inf. Secur."},{"key":"key\n\t\t\t\t20180724122915_bxy039C16","first-page":"181","article-title":"Forensic analysis of mers smishing hacking attacks and prevention","volume":"10","author":"Moon","year":"2016","journal-title":"Int. J. Secur. Appl."},{"key":"key\n\t\t\t\t20180724122915_bxy039C17","first-page":"589","article-title":"Sms spam filtering technique based on artificial immune system","volume":"9","author":"Mahmoud","year":"2012","journal-title":"IJCSI Int. J. Comput. Sci. Issues"},{"key":"key\n\t\t\t\t20180724122915_bxy039C18","author":"Belabed","year":"2012"},{"key":"key\n\t\t\t\t20180724122915_bxy039C19","author":"Kang","year":"2007"},{"key":"key\n\t\t\t\t20180724122915_bxy039C20","author":"Sharifi","year":"2008"},{"key":"key\n\t\t\t\t20180724122915_bxy039C21","author":"Prakash","year":"2010"},{"key":"key\n\t\t\t\t20180724122915_bxy039C22","author":"Gastellier-Prevost","year":"2011"},{"key":"key\n\t\t\t\t20180724122915_bxy039C23","author":"Cao","year":"2008"},{"key":"key\n\t\t\t\t20180724122915_bxy039C24","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","article-title":"Intelligent rule-based phishing websites classification","volume":"8","author":"Mohammad","year":"2014","journal-title":"IET Inf. Secur."},{"key":"key\n\t\t\t\t20180724122915_bxy039C25","first-page":"1","article-title":"Phidma\u2014a phishing detection model with multi-filter approach","volume":"29","author":"Sonowal","year":"2017","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"key\n\t\t\t\t20180724122915_bxy039C26","first-page":"783","article-title":"A comprehensive study of phishing attacks","volume":"4","author":"Banu","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"key\n\t\t\t\t20180724122915_bxy039C27","doi-asserted-by":"crossref","first-page":"475","DOI":"10.13089\/JKIISC.2016.26.2.475","article-title":"Improving security awareness about smishing through experiment on the optimistic bias on risk perception","volume":"26","author":"Kang","year":"2016","journal-title":"J. Korea Inst. Inf. Secur. Cryptology"},{"key":"key\n\t\t\t\t20180724122915_bxy039C28","author":"Baslyman","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C29","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s11277-016-3866-8","article-title":"Secure short url generation method that recognizes risk of target url","volume":"93","author":"Mun","year":"2017","journal-title":"Wireless Pers. Commun."},{"key":"key\n\t\t\t\t20180724122915_bxy039C30","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-981-10-5041-1_12","volume-title":"Advanced Multimedia and Ubiquitous Engineering","author":"Baek","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C31","volume-title":"Disributed System for Smishing Detection","author":"Nair","year":"2013"},{"key":"key\n\t\t\t\t20180724122915_bxy039C32","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-662-47895-0_60","volume-title":"Advanced Multimedia and Ubiquitous Engineering","author":"Lee","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C33","first-page":"338","article-title":"Phishing detection taxonomy for mobile device","volume":"10","author":"Foozy","year":"2013","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"key\n\t\t\t\t20180724122915_bxy039C34","author":"Pandey","year":"2012"},{"key":"key\n\t\t\t\t20180724122915_bxy039C35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11235-016-0269-9","article-title":"S-detector: an enhanced security model for detecting smishing attack for mobile computing","volume":"66","author":"Joo","year":"2017","journal-title":"Telecommun. Syst."},{"key":"key\n\t\t\t\t20180724122915_bxy039C36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/bxx035","article-title":"Detection of phishing websites based on probabilistic neural networks and k-medoids clustering","volume":"60","author":"El-Alfy","year":"2017","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180724122915_bxy039C37","author":"Pinterest","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C38","author":"Shams","year":"2013"},{"key":"key\n\t\t\t\t20180724122915_bxy039C39","author":"Han","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C40","author":"Smith","year":"1967"},{"key":"key\n\t\t\t\t20180724122915_bxy039C41","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1037\/h0057532","article-title":"A new readability yardstick","volume":"32","author":"Flesch","year":"1948","journal-title":"J. Appl. Psychol."},{"key":"key\n\t\t\t\t20180724122915_bxy039C42","volume-title":"The Technique of Clear Writing","author":"Gunning","year":"1952"},{"key":"key\n\t\t\t\t20180724122915_bxy039C43","first-page":"639","article-title":"Smog grading \u2013 a new readability formula","volume":"12","author":"Mc Laughlin","year":"1969","journal-title":"J. Read."},{"key":"key\n\t\t\t\t20180724122915_bxy039C44","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1037\/h0076540","article-title":"A computer readability formula designed for machine scoring","volume":"60","author":"Coleman","year":"1975","journal-title":"J. Appl. Psychol."},{"key":"key\n\t\t\t\t20180724122915_bxy039C45","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird","year":"2009"},{"key":"key\n\t\t\t\t20180724122915_bxy039C46","author":"Bird","year":"2004"},{"key":"key\n\t\t\t\t20180724122915_bxy039C47","author":"Duman","year":"2016"},{"key":"key\n\t\t\t\t20180724122915_bxy039C48","author":"Keretna","year":"2013"},{"key":"key\n\t\t\t\t20180724122915_bxy039C49","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1155\/2014\/425731","article-title":"Classification of phishing email using random forest machine learning technique","volume":"2014","author":"Akinyelu","year":"2014","journal-title":"J. Appl. Math."},{"key":"key\n\t\t\t\t20180724122915_bxy039C50","author":"Abu-Nimeh","year":"2007"},{"key":"key\n\t\t\t\t20180724122915_bxy039C51","author":"Ho","year":"1995"},{"key":"key\n\t\t\t\t20180724122915_bxy039C52","author":"Basnet","year":"2010"},{"key":"key\n\t\t\t\t20180724122915_bxy039C53","author":"Toolan","year":"2009"},{"key":"key\n\t\t\t\t20180724122915_bxy039C54","author":"Fette","year":"2007"},{"key":"key\n\t\t\t\t20180724122915_bxy039C55","doi-asserted-by":"crossref","first-page":"921","DOI":"10.3923\/itj.2012.921.925","article-title":"A svm-based technique to detect phishing urls","volume":"11","author":"Huang","year":"2012","journal-title":"Inf. Technol. J."},{"key":"key\n\t\t\t\t20180724122915_bxy039C56","author":"Yearwood","year":"2010"},{"key":"key\n\t\t\t\t20180724122915_bxy039C57","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.jnca.2012.05.009","article-title":"A multi-tier phishing detection and filtering approach","volume":"36","author":"Islam","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"key\n\t\t\t\t20180724122915_bxy039C58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2012-1","article-title":"phishgillnet\u2014phishing detection methodology using probabilistic latent semantic analysis, adaboost, and co-training","volume":"2012","author":"Ramanathan","year":"2012","journal-title":"EURASIP J. Inf. Secur."},{"key":"key\n\t\t\t\t20180724122915_bxy039C59","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.cose.2012.12.002","article-title":"Phishing detection and impersonated entity discovery using conditional random field and latent dirichlet allocation","volume":"34","author":"Ramanathan","year":"2013","journal-title":"Comput. Secur."},{"key":"key\n\t\t\t\t20180724122915_bxy039C60","first-page":"1","volume-title":"Pearson Correlation Coefficient. Noise Reduction in Speech Processing","author":"Benesty","year":"2009"},{"key":"key\n\t\t\t\t20180724122915_bxy039C61","author":"Inomata","year":"2005"},{"key":"key\n\t\t\t\t20180724122915_bxy039C62","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"Guyon","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"key\n\t\t\t\t20180724122915_bxy039C63","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-35488-8","volume-title":"An Introduction to Feature Extraction. Feature Extraction: Foundations and Applications","author":"Guyon","year":"2006"},{"key":"key\n\t\t\t\t20180724122915_bxy039C64","author":"Almeida","year":"2017"},{"key":"key\n\t\t\t\t20180724122915_bxy039C65","author":"Yadav","year":"2011"},{"key":"key\n\t\t\t\t20180724122915_bxy039C66","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1007\/978-3-319-07674-4_77","volume-title":"Advanced Computer and Communication Engineering Technology","author":"Mohd","year":"2015"},{"key":"key\n\t\t\t\t20180724122915_bxy039C67","first-page":"1","article-title":"On determining the most effective subset of features for detecting phishing websites","volume":"122","author":"Hassan","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"key\n\t\t\t\t20180724122915_bxy039C68","first-page":"122","article-title":"Feature selection algorithm in email classification","volume":"42","author":"Wang","year":"2006","journal-title":"Jisuanji Gongcheng yu Yingyong (Comput. Eng. Appl.)"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1143\/25209236\/bxy039.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T04:39:07Z","timestamp":1571027947000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1143\/4985552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,25]]},"references-count":68,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,4,25]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy039","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,4,25]]}}}