{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T09:23:36Z","timestamp":1771925016078,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016077","name":"EU","doi-asserted-by":"publisher","award":["G23C24000790006"],"award-info":[{"award-number":["G23C24000790006"]}],"id":[{"id":"10.13039\/100016077","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/iccvw69036.2025.00784","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:44:02Z","timestamp":1771879442000},"page":"7617-7625","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning-Based Intrusion Detection Systems for Phishing Email Detection: A Short Survey"],"prefix":"10.1109","author":[{"given":"Axel","family":"De Nardin","sequence":"first","affiliation":[{"name":"University of Udine,Udine,Italy"}]},{"given":"Silvia","family":"Zottin","sequence":"additional","affiliation":[{"name":"University of Udine,Udine,Italy"}]},{"given":"Claudio","family":"Piciarelli","sequence":"additional","affiliation":[{"name":"University of Udine,Udine,Italy"}]},{"given":"Gian Luca","family":"Foresti","sequence":"additional","affiliation":[{"name":"University of Udine,Udine,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3351946"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s24072077"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12204261"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-272.spam-jozef-stefan-inst.bratko"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-274.spam-overview"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-266.enterprise-overview"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.03.012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963160"},{"key":"ref9","volume-title":"Real-time anomaly detection in docker containers: A continuous learning approach using sf-soinn","author":"Ejeh","year":"2025"},{"key":"ref10","first-page":"1","article-title":"Anti-phishing pilot at acm iwspa 2018","volume-title":"Proc. 1st AntiPhishing Shared Pilot 4th ACM Int. Workshop Secur. Privacy Anal.(IWSPA)","author":"El Aassal","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2024.056473"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851801"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.402"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-11055-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13193823"},{"key":"ref17","article-title":"Enhancing phishing email identification with large language models","author":"Lee","year":"2025","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3579987.3586567"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.09.002"},{"key":"ref20","volume-title":"online phishing corpus","author":"Nazario","year":"2006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS65363.2025.11012014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3606031"},{"key":"ref24","volume-title":"Apache spamassassi","author":"Schwartz","year":"2023"},{"key":"ref25","article-title":"Improving phishing detection via psychological trait scoring","author":"Shahriar","year":"2022","journal-title":"arXiv preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2025.0331.36"},{"key":"ref27","article-title":"Bert-based models for phishing detection","volume-title":"28th Conference on Information Society and University Studies (IVUS\u20182023). CEUR Workshop Proceedings","author":"Songailait\u0117","year":"2023"},{"key":"ref28","volume-title":"fraudulent e-mail corpus.","author":"Tatman","year":"2002"},{"key":"ref29","volume-title":"Phishing activity trends reports","year":"2025"}],"event":{"name":"2025 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,10,19]]},"end":{"date-parts":[[2025,10,20]]}},"container-title":["2025 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11373940\/11374285\/11374520.pdf?arnumber=11374520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:35:10Z","timestamp":1771922110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11374520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iccvw69036.2025.00784","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}