{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:03:52Z","timestamp":1776841432162,"version":"3.51.2"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1319212"],"award-info":[{"award-number":["CNS 1319212"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE 1433817"],"award-info":[{"award-number":["DGE 1433817"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE 1356705"],"award-info":[{"award-number":["DUE 1356705"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-16-1-0422"],"award-info":[{"award-number":["W911NF-16-1-0422"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2969780","type":"journal-article","created":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T20:41:25Z","timestamp":1580157685000},"page":"22170-22192","source":"Crossref","is-referenced-by-count":117,"title":["An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs"],"prefix":"10.1109","volume":"8","author":[{"given":"Ayman","family":"El Aassal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9814-9270","authenticated-orcid":false,"given":"Shahryar","family":"Baki","sequence":"additional","affiliation":[]},{"given":"Avisha","family":"Das","sequence":"additional","affiliation":[]},{"given":"Rakesh M.","family":"Verma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"ma","year":"2009","journal-title":"Detecting Malicious"},{"key":"ref38","first-page":"1","article-title":"Imbalanced-learn: A Python toolbox to tackle the curse of imbalanced datasets in machine learning","volume":"18","author":"lema\u00eetre","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref31","first-page":"1","article-title":"Distributed representation using target classes: Bag of tricks for security and privacy analytics","author":"ganesh","year":"2018","journal-title":"Proc 4th ACM Int Workshop Secur Privacy Anal (IWSPA)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5120\/21813-5191"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.3"},{"key":"ref36","article-title":"URLNet: Learning a URL representation with deep learning for malicious URL detection","author":"le","year":"2018","journal-title":"arXiv 1802 03162"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"ref60","author":"volkman","year":"2018","journal-title":"The 2018 Phishing Trends & Intelligence Report Now"},{"key":"ref62","year":"2018","journal-title":"WikiLeaks"},{"key":"ref61","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"Proc of 17th NDSS"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.03.077"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.126"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2016.8405"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2015.02.08"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0418-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.76"},{"key":"ref2","first-page":"169","article-title":"An enhanced online phishing e-mail detection framework based on evolving connectionist system","volume":"9","author":"almomani","year":"2012","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref1","first-page":"2","article-title":"Anti-phishing pilot at ACM IWSPA 2018: Evaluating performance with new metrics for unbalanced datasets","author":"aassal","year":"2018","journal-title":"Proc Anti-Phishing Shared Task Pilot at 4th ACM IWSPA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557575"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004239"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"ref23","first-page":"2962","article-title":"Efficient and robust automated machine learning","author":"feurer","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963161"},{"key":"ref25","article-title":"An open source AutoML benchmark","author":"gijsbers","year":"0","journal-title":"arXiv 1907 00909"},{"key":"ref50","author":"salton","year":"1986","journal-title":"Introduction to Modern Information Retrieval"},{"key":"ref51","author":"shukla","year":"2015","journal-title":"Identifies Phishing Websites Using a Treebag Model"},{"key":"ref59","article-title":"Meta-searching: Should search engine rankings be aggregated","author":"verma","year":"2010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.121"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699115"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2010.5706696"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567380"},{"key":"ref54","year":"2015","journal-title":"H2O Python Interface for H2O Python Package Version 3 1 0 99999"},{"key":"ref53","year":"2018","journal-title":"Spam Assassin"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"ref11","article-title":"Enriching word vectors with subword information","author":"bojanowski","year":"2016","journal-title":"arXiv 1607 04606"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.050"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0222-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.05.031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237040"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2957750"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232958"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-017-0434-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2752087"},{"key":"ref4","article-title":"Benchmarking automatic machine learning frameworks","author":"balaji","year":"2018","journal-title":"arXiv 1808 06492"},{"key":"ref3","year":"2019","journal-title":"Phishing Activity Trends Report&#x2013;1st Quarter 2019"},{"key":"ref6","first-page":"10","article-title":"Evaluation measures for models assessment over imbalanced datasets","volume":"3","author":"bekkar","year":"2013","journal-title":"J Inf Eng Appl"},{"key":"ref5","author":"baskaran","year":"2018","journal-title":"Phishing URL Classification"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0371"},{"key":"ref7","first-page":"1","article-title":"Improved phishing detection using model-based features","author":"bergholz","year":"2008","journal-title":"Proc CEAS"},{"key":"ref49","article-title":"Malicious URL detection using machine learning: A survey","author":"sahoo","year":"2017","journal-title":"arXiv 1701 07179"},{"key":"ref9","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2908812.2908918"},{"key":"ref45","author":"nohe","year":"2018","journal-title":"HTTPS Phishing 49% of Phishing Websites Now Sport The Green Padlock"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9838169"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref42","first-page":"110","article-title":"A chi-square-test for word importance differentiation in text classification","volume":"6","author":"meesad","year":"2011","journal-title":"Comput Sci Inf Technol"},{"key":"ref41","first-page":"4","article-title":"Behind phishing: An examination of phisher modi operandi","author":"mcgrath","year":"2008","journal-title":"Proc lEE"},{"key":"ref44","first-page":"220","article-title":"PhishMon: A machine learning framework for detecting phishing Web pages","author":"niakanlahiji","year":"2018","journal-title":"Proc IEEE Int Conf Intell Secur Informat (ISI)"},{"key":"ref43","author":"nazario","year":"2004","journal-title":"The Online Phishing Corpus"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/8948470\/8970564-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08970564.pdf?arnumber=8970564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:32Z","timestamp":1649444012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8970564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2969780","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}