{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:57:33Z","timestamp":1769065053167,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10306583","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-14","source":"Crossref","is-referenced-by-count":5,"title":["A Comprehensive Study of Web Phishing Detection Using Machine and Deep Learning Architecture"],"prefix":"10.1109","author":[{"given":"N.","family":"Prabhu","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]},{"given":"Senthil Kumar","family":"T","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]},{"given":"Jeyakumar","family":"G","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]}],"member":"263","reference":[{"issue":"18","key":"ref1","article-title":"An Approach For Detecting Phishing Attacks Using Machine Learning Techniques","volume":"7","author":"Rao","year":"2020","journal-title":"Journal Of Critical Reviews","ISSN":"https:\/\/id.crossref.org\/issn\/2394-5125","issn-type":"print"},{"key":"ref2","first-page":"1","volume-title":"Phishing Detection Using Machine Learning Techniques","author":"Shahrivari","year":"2020"},{"issue":"02","key":"ref3","article-title":"Detecting Phishing Websites Using Machine Learning","volume":"07","author":"Patil","year":"2020","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/425731"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100702"},{"key":"ref6","first-page":"64","article-title":"Machine learning based phishing E-mail detection Security-CEN@Amrita","volume-title":"CEUR Workshop Proceedings","volume":"2124","author":"Unnithan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3151903"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-10841-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2022921868"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s21248281"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3013699"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1916\/1\/012169"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4678746"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010232"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.004"},{"key":"ref17","first-page":"880","article-title":"Deep learning for identification and validation of objects and data viewed through vehicle windshield in lab environment \u2013 a DCNN approach","volume":"10","author":"Ramakrishnan","year":"2018","journal-title":"Journal of Advanced Research in Dynamical and Control Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2671-0_10"},{"issue":"21","key":"ref19","first-page":"4422","article-title":"Experimental method to improve the accuracy of phishing URL detection using theil classifier","volume":"15","author":"Rakesh","journal-title":"Asian Journal of Information Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229752"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Delhi, India","start":{"date-parts":[[2023,7,6]]},"end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10306583.pdf?arnumber=10306583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T11:58:59Z","timestamp":1710417539000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10306583","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}