{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:10:38Z","timestamp":1771701038437,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073403","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:08Z","timestamp":1508959148000},"page":"1-4","source":"Crossref","is-referenced-by-count":25,"title":["Random forest explorations for URL classification"],"prefix":"10.1109","author":[{"given":"Martyn","family":"Weedon","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Tsaptsinos","sequence":"additional","affiliation":[]},{"given":"James","family":"Denholm-Price","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2016","journal-title":"AOL"},{"key":"ref11","year":"2016","journal-title":"AOL"},{"key":"ref12","year":"2016","journal-title":"PhishTank"},{"key":"ref13","year":"2016","journal-title":"PhishTank"},{"key":"ref14","author":"eibe","year":"2016","journal-title":"The WEKA Workbench Online Appendix for &#x201C;Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-7307-6_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.15623\/ijret.2014.0306003","article-title":"Learning to detect phishing URLs","volume":"3","author":"basnet","year":"2014","journal-title":"IJRET International Journal of Research in Engineering and Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027532"},{"key":"ref2","year":"2016","journal-title":"Anti-Phishing Working Group"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"London, United Kingdom","start":{"date-parts":[[2017,6,19]]},"end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073403.pdf?arnumber=8073403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T04:35:13Z","timestamp":1570250113000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073403","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}