{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:28:39Z","timestamp":1770564519445,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,5]]},"DOI":"10.1109\/besc51023.2020.9348318","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:16:41Z","timestamp":1619061401000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Are They Likely to Complain on Phish or Spam? A Prediction Model"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Al-Hussaini","sequence":"first","affiliation":[{"name":"College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar"}]},{"given":"Dena","family":"Al-Thani","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar"}]},{"given":"Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055188"},{"key":"ref14","first-page":"325","author":"chatterjee","year":"2016","journal-title":"An automatic and robust system for identification of problematic call centre conversations"},{"key":"ref15","first-page":"204","article-title":"Call-type classification and unsupervised training for the call center domain","author":"min","year":"2003","journal-title":"IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2018.8436314"},{"key":"ref17","author":"dietterich","year":"0","journal-title":"Ensemble Methods in Machine Learning"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"7","DOI":"10.5120\/ijca2017915495","article-title":"A comparative study of categorical variable encoding techniques for neural network classifiers","volume":"175","author":"potdar","year":"2017","journal-title":"International Journal of Computer Applications"},{"key":"ref19","first-page":"4765","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518839"},{"key":"ref6","first-page":"352","author":"yadav","year":"2012","journal-title":"Take control of your smses Designing an usable spam sms filtering system"},{"key":"ref5","first-page":"28","author":"sethi","year":"2017","journal-title":"Sms spam detection and comparison of various machine learning algorithms"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858085"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2008.247"},{"key":"ref1","article-title":"Reducing the risk of e-mail phishing in the state of qatar through an effective awareness framework","author":"al-hamar","year":"2010","journal-title":"&#x00A9; Mariam Khalid Al-Hamar"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref20","author":"developers","year":"0","journal-title":"Documentation - xgboost tutorials - introduction to boosted trees"},{"key":"ref21","first-page":"57","author":"cortes","year":"1995","journal-title":"Limits on learning machine accuracy imposed by data quality"}],"event":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","location":"Bournemouth, United Kingdom","start":{"date-parts":[[2020,11,5]]},"end":{"date-parts":[[2020,11,7]]}},"container-title":["2020 7th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9348100\/9348278\/09348318.pdf?arnumber=9348318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:48:59Z","timestamp":1656452939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9348318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/besc51023.2020.9348318","relation":{},"subject":[],"published":{"date-parts":[[2020,11,5]]}}}