{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T12:48:52Z","timestamp":1749732532993,"version":"3.29.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,16]]},"DOI":"10.1109\/ccci61916.2024.10736460","type":"proceedings-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T18:29:37Z","timestamp":1730831377000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Machine Learning-Based Security Mechanism for Detecting Phishing Attacks"],"prefix":"10.1109","author":[{"given":"Pragya","family":"Bhatt","sequence":"first","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"University of Jordan,KASIT,Amman,Jordan,11942"}]},{"given":"Gagan","family":"Dangwal","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research International Institute of Information Technology,Hyderabad,India,500 032"}]},{"given":"Mohammad","family":"Wazid","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"}]},{"given":"Balqies","family":"Sadoun","sequence":"additional","affiliation":[{"name":"College of Engineering, Al-Balqa&#x2019; Applied University,Al-Salt,Jordan,19117"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.37965\/jait.2023.0197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.31185\/wjps.145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.97"},{"issue":"5","key":"ref4","first-page":"3645","article-title":"Phishing URL Detection using Machine Learning","volume":"1","author":"Kailas","year":"2023","journal-title":"International Journal For Science Technology And Engineering"},{"volume-title":"Phishing detection using machine learning","year":"2020","author":"Wandhare","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ieeecloudsummit48914.2020.00022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21512\/emacsjournal.v5i2.9951"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59817-4_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.48175\/ijarsct-7822"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0616-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTCEE49637.2020.9277256"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE51753.2021.9431794"},{"key":"ref13","first-page":"184","volume-title":"Principal component analysis as tool for data reduction with an application","author":"H","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/pr10071356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258361"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103125"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCONF58270.2023.10235021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511536700"}],"event":{"name":"2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","start":{"date-parts":[[2024,10,16]]},"location":"Beijing, China","end":{"date-parts":[[2024,10,18]]}},"container-title":["2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10736449\/10736450\/10736460.pdf?arnumber=10736460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T14:29:04Z","timestamp":1732717744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10736460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ccci61916.2024.10736460","relation":{},"subject":[],"published":{"date-parts":[[2024,10,16]]}}}