{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:05:37Z","timestamp":1752282337391},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622646","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"1322-1327","source":"Crossref","is-referenced-by-count":3,"title":["Deep Learning and Big Data Integration with Cuckoo Search Optimization for Robust Phishing Attack Detection"],"prefix":"10.1109","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[{"name":"Asia University,Department of Computer Science and Information Engineering,Taichung,Taiwan,413"}]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[{"name":"Ronin Institute,Montclair,NJ,USA"}]},{"given":"Jinsong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Guilin University of Electronic Technology,China,510004"}]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[{"name":"Asia University,Taichung,Taiwan"}]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[{"name":"Hong Kong Metropolitan University (HKMU),Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20420-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5421046"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8536-9_44"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app13084649"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17977\/um005v7i12023p99"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.53730\/ijhs.v6nS3.7944"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06401-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2975033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.46386\/ijcfati.v2i1.29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297035"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.013.2300115"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109091"},{"journal-title":"Convolution neural network (cnn) based phishing attack detection model for e-business in enterprise information systems","year":"2023","author":"Gupta","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000296"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.310055"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.29207\/resti.v6i3.4035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/ijswis.302895"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.120110"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/ijswis.297032"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297098"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311035"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.305857"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4678746"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.315653"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.300359"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003569"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","start":{"date-parts":[[2024,6,9]]},"location":"Denver, CO, USA","end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622646.pdf?arnumber=10622646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:39:37Z","timestamp":1724963977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622646","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}