{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:19:09Z","timestamp":1768990749764,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949409","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"55-59","source":"Crossref","is-referenced-by-count":9,"title":["Phishing detection using stochastic learning-based weak estimators"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Lijo","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"norris","year":"1999","journal-title":"Markov Chains"},{"key":"ref11","author":"kushner","year":"2003","journal-title":"Stochastic Approximation and Recusrive Algorithms and Applications"},{"key":"ref12","article-title":"Learning from delayed rewards","author":"watkins","year":"1989","journal-title":"University of Cambridge England"},{"key":"ref13","year":"2005","journal-title":"Phishing dataset created from millersmiles collected from"},{"key":"ref14","year":"2008","journal-title":"OpenDNS PhishTank"},{"key":"ref15","year":"2006","journal-title":"Ham obtained Enron-spam dataset"},{"key":"ref16","article-title":"Website:","year":"2008","journal-title":"Open NLP"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"ref18","article-title":"The Java WordNet Library","author":"didion","year":"2004","journal-title":"http \/\/jwordnet sourceforge net\/"},{"key":"ref19","first-page":"125","article-title":"Spam filtering with na&#x00EF;ve bayes-which na&#x00EF;ve bayes","author":"metsis","year":"2006","journal-title":"Proceedings of the Third Conference on Email and Anti-Spam (CEAS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2006.872256"},{"key":"ref5","year":"2008","journal-title":"Bayesian Spam Classification Applied to Phishing Email"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277790"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2006.1696374"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.09.007"},{"key":"ref1","year":"0","journal-title":"Anti-Phishing Working Group APWG Public Education Initiatives"},{"key":"ref9","article-title":"Learning Automata. An Introduction","author":"narendra","year":"1989","journal-title":"Prentice Hall"},{"key":"ref20","first-page":"412","article-title":"A comparative study on feature selection in text categorization","author":"yang","year":"1997","journal-title":"Proceedings of the Interntional Conference on Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"ref21","first-page":"234","article-title":"Feature selection using linear classifier weights; interaction with classification models","author":"mladenic","year":"2004","journal-title":"ACM"},{"key":"ref24","article-title":"Anomaly Detection in Dynamic Social Email Systems","author":"zhan","year":"2009","journal-title":"Proceedings of IEEE International Conference on Social Computing"},{"key":"ref23","author":"grath","year":"0","journal-title":"Behind Phishing An Examination of Phisher Modi Operandi"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","location":"Paris, France","start":{"date-parts":[[2011,4,11]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949409.pdf?arnumber=5949409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:21:49Z","timestamp":1490052109000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949409","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}