{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:21:05Z","timestamp":1740169265319,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3082000","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T20:50:20Z","timestamp":1621457420000},"page":"87962-87971","source":"Crossref","is-referenced-by-count":5,"title":["Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-3672","authenticated-orcid":false,"given":"Bo","family":"Sun","sequence":"first","affiliation":[{"name":"Department of Information Systems, Saitama Institute of Technology, Fukaya, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9616-3212","authenticated-orcid":false,"given":"Tao","family":"Ban","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1728-5300","authenticated-orcid":false,"given":"Chansu","family":"Han","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]},{"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University, Yokohama, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5819-3082","authenticated-orcid":false,"given":"Jun'ichi","family":"Takeuchi","sequence":"additional","affiliation":[{"name":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan"}]},{"given":"Abdolhossein","family":"Sarrafzadeh","sequence":"additional","affiliation":[{"name":"Center of Excellence in Cybersecurity, North Carolina A&#x0026;T State University, Greensboro, NC, USA"}]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, Texas A&#x0026;M University&#x2013;Commerce, Commerce, TX, USA"}]},{"given":"Daisuke","family":"Inoue","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Japan"}]}],"member":"263","reference":[{"journal-title":"spacy - industrial-strength natural language processing in python","year":"2021","key":"ref38"},{"journal-title":"Virustotal Private API v2 0","year":"2021","key":"ref33"},{"journal-title":"Scikit-learn Machine Learning in Python","year":"2021","key":"ref32"},{"key":"ref31","first-page":"1871","article-title":"LIBLINEAR: A library for large linear classification","volume":"9","author":"fan","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref30","article-title":"Comparative study of techniques for large-scale feature selection","author":"ferri","year":"2001","journal-title":"Pattern Recognition in Practice IV Multiple Paradigms Comparative Studies and Hybrid Systems"},{"journal-title":"Natural Language Toolkit","year":"2021","key":"ref37"},{"key":"ref36","article-title":"A C-LSTM neural network for text classification","author":"zhou","year":"2015","journal-title":"arXiv 1511 08630"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700274"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129713"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973700"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.154"},{"key":"ref16","first-page":"469","article-title":"Detecting credential spearphishing in enterprise settings","author":"ho","year":"2017","journal-title":"Proc Usenix Secur Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014069"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.05.031"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1109\/TKDE.2006.180","article-title":"Some effective techniques for naive bayes text classification","volume":"18","author":"kim","year":"2006","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600349CM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"journal-title":"Advanced Persistent Threat","year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23250"},{"journal-title":"HanLP Han language processing","year":"2021","key":"ref29"},{"journal-title":"Spear phishing","year":"2021","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_3"},{"journal-title":"VirusTotal - Free Online Virus Malware and URL Scanner","year":"2021","key":"ref7"},{"key":"ref2","first-page":"50","article-title":"Advanced persistent threat attack detection: An overview","volume":"4","author":"ghafir","year":"2014","journal-title":"Int J Adv Comput Netw Secur"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"ref20","first-page":"563","article-title":"Text classification using string kernels","author":"lodhi","year":"2000","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS.2016.7779373"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1198\/004017007000000245"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3058-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2010.5674791"},{"journal-title":"Baidu Document Classification API","year":"2021","key":"ref26"},{"key":"ref25","first-page":"404","article-title":"Textrank: Bringing order into text","author":"mihalcea","year":"2004","journal-title":"Proc Conf Empirical Methods Natural Lang Process"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09435284.pdf?arnumber=9435284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:40:43Z","timestamp":1662669643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9435284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3082000","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}