{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:27:01Z","timestamp":1747200421273},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T00:00:00Z","timestamp":1675728000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,7]]},"DOI":"10.1109\/icaic57335.2023.10044171","type":"proceedings-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T13:25:00Z","timestamp":1677072300000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious Activities"],"prefix":"10.1109","author":[{"given":"Wesam","family":"Fadheel","sequence":"first","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,MI,USA,49008"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steve","family":"Carr","sequence":"additional","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,MI,USA,49008"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wassnaa","family":"Al-Mawee","sequence":"additional","affiliation":[{"name":"Western Michigan University,Department of Computer Science,Kalamazoo,MI,USA,49008"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Wikipedia","article-title":"Sandbox (computer security)","year":"2022","key":"ref13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MASS50613.2020.00080"},{"journal-title":"Honeypot (Computing)","year":"2022","key":"ref14"},{"journal-title":"Support Vector Machine Wikipedia","year":"0","key":"ref20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICICV50876.2021.9388441"},{"journal-title":"Normal distribution Wikipedia","year":"0","key":"ref22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES45898.2019.9002145"},{"journal-title":"Wikipedia","article-title":"Confusion matrix","year":"2022","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2015.7375147"},{"key":"ref1","article-title":"Extracting Feature Vectors from URL Strings for Malicious URL Detection","author":"ikwu","year":"2021","journal-title":"Medium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM51794.2021.00030"},{"journal-title":"Wikipedia","article-title":"Logistic regression","year":"2022","key":"ref19"},{"journal-title":"Wikipedia Dec 20 2022 Accessed Jan 04","article-title":"k-nearest neighbors algorithm","year":"2023","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSIT55514.2022.9943832"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.146"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IC3SIS54991.2022.9885595"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT46704.2019.8938566"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT48778.2020.9115782"},{"journal-title":"GeeksforGeeks","article-title":"What is Cross Site Scripting (XSS)?","year":"2019","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346927"}],"event":{"name":"2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC)","start":{"date-parts":[[2023,2,7]]},"location":"Houston, TX, USA","end":{"date-parts":[[2023,2,9]]}},"container-title":["2023 IEEE 2nd International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10044118\/10044119\/10044171.pdf?arnumber=10044171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T13:34:10Z","timestamp":1679319250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10044171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icaic57335.2023.10044171","relation":{},"subject":[],"published":{"date-parts":[[2023,2,7]]}}}