{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:28:55Z","timestamp":1766068135210,"version":"3.30.2"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1109\/iccp63557.2024.10793001","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:09Z","timestamp":1734462549000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A Feature Engineering Approach for Detecting Phishing Emails"],"prefix":"10.1109","author":[{"given":"Andrei","family":"Dumitras","sequence":"first","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Cristinel Mihai","family":"Mocan","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Ciprian","family":"Oprisa","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]}],"member":"263","reference":[{"volume-title":"The first email message","year":"2024","author":"Compbell","key":"ref1"},{"volume-title":"Number of e-mail users worldwide from 2017 to 2026","year":"2024","author":"Ceci","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103671"},{"volume-title":"The latest 2024 cyber crime statistics (updated july 2024)","year":"2024","author":"Griffiths","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.077"},{"volume-title":"What is phishing?","year":"2024","key":"ref6"},{"key":"ref7","first-page":"2010","article-title":"Large-scale automatic classification of phishing pages","volume":"10","author":"Whittaker","year":"2010","journal-title":"Ndss"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3934\/electreng.2021006"},{"volume-title":"2024 state of the phish","year":"2024","key":"ref9"},{"volume-title":"Phishing activity trends re-port 1st quarter 2021","year":"2021","key":"ref10"},{"key":"ref11","article-title":"Prompted contextual vectors for spear-phishing detection","author":"Nahmias","year":"2024","journal-title":"arXiv preprint"},{"volume-title":"Phishing pot","year":"2022","key":"ref12"},{"key":"ref13","article-title":"Large language models spot phishing emails with surprising accuracy: A comparative analysis of performance","author":"Patel","year":"2024","journal-title":"arXiv preprint"},{"journal-title":"Chatspamdetector: Leveraging large language models for effective phishing email detection","year":"2024","author":"Koide","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s24072077"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-55174-1_9"},{"volume-title":"Mime (multipurpose internet mail extensions)","year":"2024","author":"Awati","key":"ref17"},{"volume-title":"Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies","year":"1996","author":"Freed","key":"ref18"},{"volume-title":"The Basel6, Base32, and Base64 Data Encodings","year":"2006","author":"Josefsson","key":"ref19"},{"volume-title":"The \u2018text\/html\u2019 Media Type","author":"Masinter","key":"ref20"},{"volume-title":"email - an email and mime handling package","year":"1995","author":"Batchelder","key":"ref21"},{"volume-title":"Beautiful soup documentation","year":"2004","author":"Pilgrim","key":"ref22"},{"volume-title":"Email spoofing: How to identify a spoofed email, CrowdStrike - Cybersecurity 101","year":"2022","author":"Lenaerts-Bergmans","key":"ref23"},{"volume-title":"difflib - helpers for computing deltas","year":"1995","author":"Batchelder","key":"ref24"},{"volume-title":"Email authentication: Your id card for sending","year":"2024","author":"Trejo","key":"ref25"},{"volume-title":"Github: email-domains-top-l00","year":"2021","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.165"},{"volume-title":"Openai python api library","year":"2023","author":"App","key":"ref28"},{"volume-title":"Llama 3","year":"2023","key":"ref29"},{"volume-title":"Lm studio documentation","year":"2024","author":"Team","key":"ref30"},{"volume-title":"Influence: The Psychology of Per-suasion. Business Library","year":"1984","author":"Cialdini","key":"ref31"},{"volume-title":"Text splitters","year":"2023","author":"LangChain","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010042"},{"volume-title":"Scikit-learn laboratory documentation","year":"2024","author":"SciKit-Learn","key":"ref34"}],"event":{"name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2024,10,17]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2024,10,19]]}},"container-title":["2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10792975\/10792923\/10793001.pdf?arnumber=10793001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T07:30:47Z","timestamp":1734507047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iccp63557.2024.10793001","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]}}}