{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:16Z","timestamp":1756271416063,"version":"3.44.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130163","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"1069-1074","source":"Crossref","is-referenced-by-count":0,"title":["Fraud Detection in Web Content Using Machine Learning and Natural Language Processing"],"prefix":"10.1109","author":[{"given":"Andreea","family":"Dance","sequence":"first","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Andreas","family":"Fr\u0103ticiu","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Ciprian","family":"Opri\u015fa","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]}],"member":"263","reference":[{"author":"Rogers","key":"ref1","article-title":"International scammers steal over $ 1 trillion in 12 months in global state of scams report 2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825018"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"104347","DOI":"10.1016\/j.engappai.2021.104347","article-title":"Towards benchmark datasets for machine learning based website phishing detection: An experimental study","volume":"104","author":"Hannousse","year":"2021","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223647"},{"issue":"9","key":"ref5","doi-asserted-by":"crossref","first-page":"5275","DOI":"10.3390\/app13095275","article-title":"A phishing-attack-detection model using natural language processing and deep learning","volume":"13","author":"Benavides-Astudillo","year":"2023","journal-title":"Applied Sciences"},{"key":"ref6","article-title":"Phishing website detection through multi-model analysis of html content","author":"Colhak","year":"2024","journal-title":"arXiv preprint arXiv:2401.04820"},{"author":"Sun","key":"ref7","article-title":"Dvla fraud warning: Drivers targeted by scam"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123894"},{"journal-title":"VnExpress International","article-title":"Hong kong romance scam targets asian men with deepfake videos, swindles $ 4.6m","year":"2024","key":"ref9"},{"author":"Kieffer","key":"ref10","article-title":"Phishing for phools: The economics of manipulation and deception - implications for financial literacy"},{"author":"Sun","key":"ref11","article-title":"Geelong couple john, gail young lose $ 500k life savings to deepfake eddie mcguire scam"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/1748895815603773"},{"key":"ref13","article-title":"Woman loses \u00a3320,000 in \u2018romance fraud\u2019 scam","author":"News","year":"2020","journal-title":"BBC News"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2011.33019"},{"first-page":"2025","article-title":"Dvla issues major fraud warning for drivers over devious scams as 20,000 drivers call to report deceit","author":"Sun","key":"ref15"},{"issue":"9","key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/math11092053","article-title":"Finding patient zero and tracking narrative changes in the context of online disinformation using semantic similarity analysis","volume":"11","author":"Artene","journal-title":"Mathematics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP60212.2023.10398606"},{"key":"ref18","article-title":"Phishing dataset for machine learning"},{"key":"ref19","article-title":"Phishing url dataset - uci"},{"key":"ref20","article-title":"Open pagerank documentation"},{"journal-title":"IBM","key":"ref21","article-title":"Using countvectorizer for nlp feature extraction"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754750"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/B978-0-12-816176-0.00026-0","article-title":"Chapter 21 - deep learning: Rnns and lstm","author":"DiPietro","year":"2020","journal-title":"Handbook of Medical Image Computing and Computer Assisted Intervention, ser. The Elsevier and MICCAI Society Book Series"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17007-z"},{"key":"ref25","first-page":"1532","article-title":"Glove: Global vectors for word representation","volume-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing","author":"Pennington"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-025-11162-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"ref28","article-title":"Randomforestclassifier - scikit-learn"},{"key":"ref29","article-title":"Support vector machines - scikit-learn"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref31","article-title":"Decision trees - scikit-learn"},{"key":"ref32","article-title":"Gradientboosting vs adaboost vs xgboost vs catboost vs lightgbm"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19991218"},{"key":"ref36","article-title":"Phishtank developer information"},{"key":"ref37","article-title":"Openphish phishing feeds"},{"author":"Richardson","key":"ref38","article-title":"beautifulsoup.4 - screen-scraping library"},{"key":"ref39","article-title":"Domains - cloudflare radar"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2024.2448835"},{"key":"ref41","article-title":"Mendeley data - phishing dataset"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130163.pdf?arnumber=11130163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:51:06Z","timestamp":1756270266000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130163","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}