{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T18:04:33Z","timestamp":1769796273290,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,10]]},"DOI":"10.1109\/icfsp67350.2025.11353877","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:25Z","timestamp":1769721565000},"page":"146-150","source":"Crossref","is-referenced-by-count":0,"title":["AI-Powered Phishing Detection In Email Forensics: A Machine Learning Approach For Cyber Threat"],"prefix":"10.1109","author":[{"given":"Aadhavan","family":"P","sequence":"first","affiliation":[{"name":"Sri Ramachandra Institute of Higher Education and Research,Dept. of Computer Science and Engineering (Cyber Security &#x0026; IoT),Chennai,India"}]},{"given":"Vasantha Kumar","family":"D","sequence":"additional","affiliation":[{"name":"Sri Ramachandra Institute of Higher Education and Research,Dept. of Computer Science and Engineering (Cyber Security &#x0026; IoT),Chennai,India"}]},{"given":"Suganthini Sri","family":"R","sequence":"additional","affiliation":[{"name":"Sri Ramachandra Institute of Higher Education and Research,Dept. of Computer Science and Engineering (Cyber Security &#x0026; IoT),Chennai,India"}]},{"given":"Jayanthi","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Sri Ramachandra Institute of Higher Education and Research,Dept. of Computer Science and Engineering (Cyber Security &#x0026; IoT),Chennai,India"}]},{"given":"Purushothaman","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"Sri Ramachandra Institute of Higher Education and Research,Dept. of Computer Science and Engineering (Artificial Intelligence and Data Analytics),Chennai,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00760-3"},{"key":"ref3","first-page":"1","article-title":"An effective phishing detection model based on URL and HTML features using XGBoost classifier","author":"Aljofey","year":"2022","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"9","key":"ref4","first-page":"1809","article-title":"Phishing email detection with hybrid deep learning model","volume":"E102.D","author":"Miyamoto","year":"2019","journal-title":"IEICE Transactions on Information and Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5421046"},{"key":"ref8","first-page":"3252","article-title":"Evaluation of phishing detection techniques based on machine learning algorithms","volume":"38","author":"Patil","year":"2012","journal-title":"Procedia Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041016"},{"key":"ref10","first-page":"378","article-title":"Detecting phishing websites using machine learning: A review","volume":"165","author":"Rao","year":"2019","journal-title":"Procedia Computer Science"},{"key":"ref11","first-page":"370","article-title":"Phishing website detection using machine learning","volume":"185","author":"Jain","year":"2021","journal-title":"Procedia Computer Science"},{"key":"ref12","first-page":"1","article-title":"Improving phishing detection using URL classification with gradient boosting decision trees","volume-title":"Proc. IEEE Latin American Conference on Computational Intelligence (LA-CCI)","author":"Bahnsen"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2010.5462216"},{"key":"ref14","first-page":"1","article-title":"Use of heuristics for detecting phishing websites","volume-title":"Proc. IEEE International Conference on Network and System Security","author":"Saini"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041016"}],"event":{"name":"2025 10th International Conference on Frontiers of Signal Processing (ICFSP)","location":"Paris, France","start":{"date-parts":[[2025,9,10]]},"end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 10th International Conference on Frontiers of Signal Processing (ICFSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11353462\/11353497\/11353877.pdf?arnumber=11353877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:16:02Z","timestamp":1769757362000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11353877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icfsp67350.2025.11353877","relation":{},"subject":[],"published":{"date-parts":[[2025,9,10]]}}}