{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T05:56:10Z","timestamp":1772862970318,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Shaanxi Provincial Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"Chinese Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M673446"],"award-info":[{"award-number":["2020M673446"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3043188","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T02:30:34Z","timestamp":1607567434000},"page":"221214-221224","source":"Crossref","is-referenced-by-count":66,"title":["Web2Vec: Phishing Webpage Detection Method Based on Multidimensional Features Driven by Deep Learning"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1154-3695","authenticated-orcid":false,"given":"Jian","family":"Feng","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Xi&#x2019;an University of Science and Technology, Xi&#x2019;an, China"}]},{"given":"Lianyang","family":"Zou","sequence":"additional","affiliation":[{"name":"Information Technology Department for Head Office of SPD Bank, Application Development Services Sub-center (Xi&#x2019;an), National Institute of Standards and Technology, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4134-9191","authenticated-orcid":false,"given":"Ou","family":"Ye","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi&#x2019;an University of Science and Technology, Xi&#x2019;an, China"}]},{"given":"Jingzhou","family":"Han","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xi&#x2019;an University of Science and Technology, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3305-0"},{"key":"ref13","first-page":"1","article-title":"Swarm intelligence approaches for parameter setting of deep learning neural network: Case study on phishing Websites classification","author":"vrbancic","year":"2018","journal-title":"Proc 9th Int Conf Web Intell Mining Semantics (WIMS)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"41","DOI":"10.20532\/cit.2019.1004702","article-title":"A phishing Webpage detection method based on stacked autoencoder and correlation coefficients","volume":"27","author":"feng","year":"2019","journal-title":"J Comput Inf Technol"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2203-7_52"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3175684.3175690"},{"key":"ref18","first-page":"1","article-title":"URLNet: Learning a URL representation with deep learning for malicious URL detection","volume":"abs 1802 3162","author":"le","year":"2018","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4678746"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.028"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2009.00922"},{"key":"ref5","first-page":"81","article-title":"A survey on phishing detection based on visual similarity of Web pages","volume":"4","author":"raj","year":"2018","journal-title":"Int J Sci Res Sci Eng Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01637-z"},{"key":"ref2","first-page":"298","article-title":"A static approach to detect drive-by-download attacks on Webpages","author":"m","year":"2013","journal-title":"Proc Int Conf Control Commun Comput (ICCC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/19565-1326"},{"key":"ref1","year":"2020","journal-title":"Phishing Activity Trends Report 2th Quarter 2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258030"},{"key":"ref22","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019735"},{"key":"ref23","first-page":"1","article-title":"DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system","volume":"2020","author":"sun","year":"2020","journal-title":"Secur Commun Netw"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753802"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09288677.pdf?arnumber=9288677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:08:43Z","timestamp":1662667723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9288677\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3043188","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}