{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:22:12Z","timestamp":1775838132108,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724442","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-17","source":"Crossref","is-referenced-by-count":5,"title":["Shielding Cyberspace: A Machine Learning Approach for Malicious URL Detection"],"prefix":"10.1109","author":[{"given":"P","family":"Anusri","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]},{"given":"S","family":"Sneha","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]},{"given":"Prabhu","family":"Natarajan","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]},{"given":"T","family":"Palanisamy","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Physical Sciences,Department of Mathematics,Coimbatore,India"}]},{"given":"Senthil Kumar","family":"Thangavel","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Coimbatore,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2023.2193350"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icdt57929.2023.10150899"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.54097\/hset.v23i.3209"},{"issue":"2","key":"ref4","first-page":"1562","article-title":"A Novel Approach for Malicious URL Detection Using Ensemble Learning Algorithms","volume":"11","author":"Zhang","year":"2021","journal-title":"International Journal of Engineering and Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v17.i3.pp1210-1214"},{"issue":"4","key":"ref6","first-page":"425","article-title":"Vote algorithm based probabilistic model for phishing website detection","volume":"31","author":"Alnajim","year":"2019","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"ref7","first-page":"225","article-title":"Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods","volume":"125","author":"Alghamdi","year":"2019","journal-title":"Expert Systems with Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2991403"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app12062806"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2977886"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3225217"},{"issue":"9","key":"ref12","first-page":"463","article-title":"Malicious Malware Detection Using Machine Learning Perspectives","volume":"29","author":"Awodiji","year":"2020","journal-title":"Information Security Journal: A Global Perspective"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224781"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18280\/ria.370422"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT57929.2023.10150899"},{"key":"ref16","first-page":"123","article-title":"A Malicious Web Page Detection Model based on SVM Algorithm","volume-title":"2023 International Conference on Cybersecurity and Computer Science (ICCCS)","author":"Zhang"},{"key":"ref17","first-page":"123","article-title":"Phishing URL Detection using Machine Learning Methods","volume-title":"2023 International Conference on Cybersecurity and Computer Science (ICCCS)","author":"Hasane Ahammad"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-381479-1.00003-4"},{"key":"ref19","first-page":"2579","article-title":"t-SNE: A Visualization Technique for High-Dimensional Data","volume":"9","author":"Maaten L","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref20","first-page":"1","article-title":"Mining dns for malicious domain registrations","volume-title":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","author":"He"},{"key":"ref21","first-page":"1","article-title":"Advances and applications in predictive modeling using random forests: A review","volume":"71","author":"Bahnsen","year":"2018","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"issue":"2","key":"ref23","first-page":"106","article-title":"A survey on URL classification approaches for phishing detection","volume":"13","author":"Bhaduri","year":"2019","journal-title":"IET Information Security"},{"issue":"4","key":"ref24","first-page":"3555","article-title":"An effective phishing URL detection method based on improved decision tree","volume":"40","author":"Zhang","year":"2020","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"10","key":"ref25","first-page":"3515","article-title":"Stock price prediction based on ensemble learning models with feature selection","volume":"10","author":"Zhou","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"5","key":"ref26","first-page":"2951","article-title":"Comparative study of machine learning algorithms in detecting phishing websites","volume":"33","author":"Liu","year":"2017","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"issue":"1","key":"ref33","first-page":"6228","article-title":"Local interpretable model-agnostic explanations (LIME)","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Lundberg"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724442.pdf?arnumber=10724442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T22:39:11Z","timestamp":1732660751000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724442","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}