{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T14:05:34Z","timestamp":1777903534119,"version":"3.51.4"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Student\u2019s Final Project Recognition RTA (Rekognisi Tugas Akhir) Grant for the fiscal year 2022"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3252366","type":"journal-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T18:25:35Z","timestamp":1677867935000},"page":"36805-36822","source":"Crossref","is-referenced-by-count":198,"title":["Phishing Detection System Through Hybrid Machine Learning Based on URL"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2190-7210","authenticated-orcid":false,"given":"Abdul","family":"Karim","sequence":"first","affiliation":[{"name":"Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1170-6335","authenticated-orcid":false,"given":"Mobeen","family":"Shahroz","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur, Punjab, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8659-8677","authenticated-orcid":false,"given":"Khabib","family":"Mustofa","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2336-0490","authenticated-orcid":false,"given":"Samir Brahim","family":"Belhaouari","sequence":"additional","affiliation":[{"name":"Division of Information and Computer Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5458-3852","authenticated-orcid":false,"given":"S. Ramana Kumar","family":"Joga","sequence":"additional","affiliation":[{"name":"Dadi Institute of Engineering and Technology, Anakapalle, Andhra Pradesh, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22448-6_18"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3175225"},{"key":"ref3","article-title":"Exploring a robust machine learning classifier for detecting phishing domains using SSL certificates","author":"Akanchha","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57024-8_10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784665"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100133"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8536-9_28"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.103"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.07.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0098-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2014-0017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31703-4_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888416"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4108\/eai.12-9-2018.155746"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8536-9_44"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456434"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","article-title":"Mobile phishing attacks and defence mechanisms: State of art and open research challenges","volume":"73","author":"Diksha","year":"2018","journal-title":"Comput. Secur."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref26","first-page":"283","article-title":"Google safe browsing-web security","volume-title":"Proc. IJCSET","volume":"5","author":"Sandhu"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493625"},{"key":"ref28","article-title":"An empirical analysis of phishing blacklists","volume-title":"Proc. 6th Conf. Email Anti-Spam (CEAS)","author":"Sheng"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.05.005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-016-0064-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3084-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093406"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76348-4_59"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1490-z"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0786-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3305-0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2018.00056"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1283472"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0414-0"},{"issue":"3","key":"ref45","first-page":"230","article-title":"Comparative analysis of serial decision tree classification algorithms","volume":"3","author":"Anyanwu","year":"2009","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-013-0304-3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.71.3363"},{"key":"ref48","first-page":"1","article-title":"Survey of classification techniques in data mining","volume-title":"Proc. Int. Multiconf. Eng. Comput. Scientists","volume":"1","author":"Phyu"},{"issue":"3","key":"ref49","first-page":"61","article-title":"Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods","volume":"10","author":"Platt","year":"1999","journal-title":"Adv. Large Margin Classifiers"},{"issue":"2","key":"ref50","first-page":"65","article-title":"Survey of classification techniques in data mining","volume":"2","author":"Archana","year":"2014","journal-title":"Int. Journal of Comput. Sci. Mobile Appl."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/1573062x.2022.2138460"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSE.2012.6282329"},{"issue":"1","key":"ref53","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.122"},{"key":"ref56","first-page":"105","article-title":"Beyond independence: Conditions for the optimality of the simple Bayesian classier","volume-title":"Proc. 13th Int. Conf. Mach. Learn.","author":"Domingos"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280791"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026666"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8_576"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.07.019"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"ref62","first-page":"605","article-title":"Application of k-nearest neighbor (KNN) approach for predicting economic events: Theoretical background","volume":"3","author":"Imandoust","year":"2013","journal-title":"Int. J. Eng. Res. Appl."},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.06.005"},{"key":"ref64","first-page":"838","article-title":"Precision-recall-gain curves: PR analysis done right","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Flach"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258361"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913705"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.064"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijengsci.2021.103587"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref70","article-title":"Phishing detection using machine learning techniques","author":"Shahrivari","year":"2020","journal-title":"arXiv:2009.11116"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04648-4_43"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014815"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8694796"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-022-00379-8"},{"key":"ref75","first-page":"3793","article-title":"Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Lin"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.5383\/juspn.17.01.005"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10058201.pdf?arnumber=10058201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T00:31:16Z","timestamp":1709425876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10058201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3252366","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}