{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:59Z","timestamp":1773247379325,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board(SERB)","doi-asserted-by":"publisher","award":["EEQ\/2020\/000423"],"award-info":[{"award-number":["EEQ\/2020\/000423"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427067","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T13:55:32Z","timestamp":1708091732000},"page":"637-641","source":"Crossref","is-referenced-by-count":7,"title":["PhishDetect: A BiLSTM based phishing URL detection framework using FastText embeddings"],"prefix":"10.1109","author":[{"given":"Kumar","family":"Mangalam","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Department of Computer Science Engineering,Ropar"}]},{"given":"Basant","family":"Subba","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Department of Computer Science Engineering,Ropar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258361"},{"key":"ref3","article-title":"Canadian Institute for Cybersecurity","volume-title":"Url dataset (iscx-url2016)","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813778"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8992930"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352828"},{"key":"ref7","author":"Le","year":"2018","journal-title":"URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.07.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.1010"},{"key":"ref10","article-title":"Detecting malicious urls using lexical analysis","volume-title":"International Conference on Network and System Security","author":"Saiful","year":"2016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2743528"},{"key":"ref12","article-title":"Advances in pre-training distributed word representations","volume-title":"Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018)","author":"Mikolov","year":"2018"},{"key":"ref13","article-title":"Distributed representations of words and phrases and their com-positionality","volume-title":"Advances in Neural Information Processing Systems","volume":"26","author":"Mikolov","year":"2013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979670"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref17","author":"Sheng","year":"2009","journal-title":"An Empirical Analysis of Phishing Blacklists"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095719"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2161999"},{"key":"ref20","author":"Zhang","year":"2006","journal-title":"Phinding Phish: Evaluating Anti-Phishing Tools"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2024,1,3]]},"end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427067.pdf?arnumber=10427067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:04:39Z","timestamp":1709456679000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427067","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}