{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:51:40Z","timestamp":1776275500471,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9813922","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"page":"1-6","source":"Crossref","is-referenced-by-count":28,"title":["BERT Against Social Engineering Attack: Phishing Text Detection"],"prefix":"10.1109","author":[{"given":"Nafiz","family":"Rifat","sequence":"first","affiliation":[{"name":"North Dakota State University,Dept. of Computer Science,Fargo,ND,USA"}]},{"given":"Mostofa","family":"Ahsan","sequence":"additional","affiliation":[{"name":"North Dakota State University,Dept. of Computer Science,Fargo,ND,USA"}]},{"given":"Md.","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"East Stroudsburg University,Dept. of Computer Science,East Stroudsburg,PA,USA"}]},{"given":"Rahul","family":"Gomes","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Eau Claire,Dept. of Computer Science,Eau Claire,WI,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.59"},{"key":"ref38","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref33","first-page":"334","article-title":"Svm multi-class classification","volume":"21","author":"bo","year":"2006","journal-title":"Journal of Data Acquisition & Processing"},{"key":"ref32","first-page":"492","article-title":"An assessment of features related to phishing websites using an automated technique","author":"mohammad","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4236\/ijis.2014.41004"},{"key":"ref30","volume":"210","author":"jensen","year":"1996","journal-title":"An Introduction to Bayesian Networks"},{"key":"ref37","article-title":"Sentiment analysis of citations using word2vec","author":"liu","year":"2017","journal-title":"arXiv preprint arXiv 1704 00177"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2016.7821805"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5514220"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1198\/004017007000000245"},{"key":"ref10","author":"rifat","year":"2020","journal-title":"Feature engineering on the cybersecurity dataset for deployment on software defined network"},{"key":"ref40","first-page":"647","article-title":"Deep learning for chinese word segmentation and pos tagging","author":"zheng","year":"2013","journal-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500111"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888907001026"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/2.485891","article-title":"Artificial neural networks: A tutorial","volume":"29","author":"jain","year":"1996","journal-title":"Computer"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491910"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2019.8833768"},{"key":"ref18","first-page":"69","article-title":"Convolutional neural networks with lstm for intrusion detection","volume":"69","author":"ahsan","year":"2020","journal-title":"Catal"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1010011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500086"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EIT48999.2020.9208339"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491845"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491923"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71381-2_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref2","year":"0","journal-title":"Protect against smishing spam text messages and text scams &#x2014; verizon"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491884"},{"key":"ref9","first-page":"1","article-title":"Mobile sms spam filtering based on mixing classifiers","author":"najadat","year":"2014","journal-title":"International Journal of Advanced Computer Research"},{"key":"ref20","author":"ahsan","year":"2021","journal-title":"Increasing the Predictive Potential of Machine Learning Models for Enhancing Cybersecurity"},{"key":"ref22","article-title":"Sms classification based on na&#x00EF;ve bayes classifier and semi-supervised learning","volume":"3","author":"sable","year":"2016","journal-title":"International Journal of Engineering Research & Innovation"},{"key":"ref21","article-title":"An improved text classification method based on bayes","author":"chen","year":"2011","journal-title":"Journal of Huaqiao University (Natural Science)"},{"key":"ref24","first-page":"1","article-title":"No rumours please! a multi-indic-lingual approach for covid fake-tweet detection","author":"kar","year":"2020","journal-title":"2021 Grace Hopper Celebration India (GHCI)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2014.V4.409"},{"key":"ref41","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"key":"ref26","year":"0","journal-title":"Sms spam collection dataset &#x2014; kaggle"},{"key":"ref25","article-title":"Using bert encoding to tackle the mad-lib attack in sms spam detection","author":"rojas-galeano","year":"2021","journal-title":"arXiv preprint arXiv 2107 06400"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","location":"Mankato, MN, USA","start":{"date-parts":[[2022,5,19]]},"end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09813922.pdf?arnumber=9813922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:45:25Z","timestamp":1659660325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9813922","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}