{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:16:25Z","timestamp":1730214985523,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,22]]},"DOI":"10.1109\/dsit55514.2022.9943832","type":"proceedings-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T15:39:41Z","timestamp":1668699581000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["On Phishing: URL Lexical and Network Traffic Features Analysis and Knowledge Extraction using Machine Learning Algorithms (A Comparison Study)"],"prefix":"10.1109","author":[{"given":"Wesam","family":"Fadheel","sequence":"first","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,USA,MI 49008"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wassnaa","family":"Al-Mawee","sequence":"additional","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,USA,MI 49008"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steve","family":"Carr","sequence":"additional","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,USA,MI 49008"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR51868.2021.9443148"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"journal-title":"Phishing Websites Features","year":"0","author":"mohammad","key":"ref12"},{"key":"ref13","article-title":"Phishing Websites Data Set","volume":"3","author":"mohammad","year":"2015","journal-title":"UCI Machine Learning Repository Phishing Websites Data Set"},{"key":"ref14","first-page":"467","article-title":"Detecting Malicious URLs Using Lexical Analysis","author":"mohammad","year":"2016","journal-title":"Network and System Security Springer International Publishing"},{"journal-title":"Wikimedia Foundation","article-title":"Principal Component Analysis","year":"2021","key":"ref15"},{"journal-title":"(2021 October 19) Support-vector machine","article-title":"Wikimedia Foundation","year":"2021","key":"ref16"},{"journal-title":"(2021 October 10) k-nearest neighbors algorithm","article-title":"Wikimedia Foundation","year":"2021","key":"ref17"},{"journal-title":"(2021 October 13) Logistic regression","article-title":"Wikimedia Foundation","year":"2021","key":"ref18"},{"journal-title":"Bartlett's test (n d )","year":"2021","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT48778.2020.9115782"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2015.7375147"},{"journal-title":"Machine Learning Catalogue","article-title":"Research, msg. &#x201C;Zero Rule Algorithm","year":"0","key":"ref6"},{"journal-title":"Weka-FeatureSelection","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT46704.2019.8938566"},{"journal-title":"Machine Learning Catalogue","article-title":"Research, msg. &#x201C;One Rule Algorithm","year":"0","key":"ref7"},{"key":"ref2","first-page":"871","article-title":"On Feature Selection for the Prediction of Phishing Websites","author":"fadheel","year":"2017","journal-title":"2017 IEEE 15th Intl Conf on Dependable Autonomic and Secure Computing 15th Intl Conf on Pervasive Intelligence and Computing 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech) Orlando FL"},{"journal-title":"Phishing Activity Trends Report 2nd Quarter 2021 Anti-Phishing Working Group","article-title":"APWG Trends Report Q2 2020 Production","year":"2021","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346927"}],"event":{"name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","start":{"date-parts":[[2022,7,22]]},"location":"Shanghai, China","end":{"date-parts":[[2022,7,24]]}},"container-title":["2022 5th International Conference on Data Science and Information Technology (DSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9943793\/9943812\/09943832.pdf?arnumber=9943832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T15:00:34Z","timestamp":1670857234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9943832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/dsit55514.2022.9943832","relation":{},"subject":[],"published":{"date-parts":[[2022,7,22]]}}}