{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:13:01Z","timestamp":1776183181708,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256280","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"235-239","source":"Crossref","is-referenced-by-count":9,"title":["Machine Learning Technique for Phishing Website Detection"],"prefix":"10.1109","author":[{"given":"Nurul Amira Binti Mohd","family":"Zin","sequence":"first","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia,26600"}]},{"given":"Mohd Faizal","family":"Ab Razak","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia,26600"}]},{"given":"Ahmad","family":"Firdaus","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia,26600"}]},{"given":"Ferda","family":"Ernawan","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia,26600"}]},{"given":"Nor Saradatul Akmar","family":"Zulkifli","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia,26600"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7850079"},{"key":"ref12","article-title":"CorrelationAttributeEval","author":"sari","year":"2017","journal-title":"ResearchGATE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.iree.2021.100225"},{"key":"ref14","article-title":"Institute of Electrical and Electronics Engineers, IEEE Communications Society;, Denshi J?h? Ts?shin Gakkai (Japan). Ts?shin Sosaieti, and Han'guk T'ongsin Hakhoe","year":"0","journal-title":"ICUFN 2019 the 11th International Conference on Ubiquitous and Future Networks July 2 (Tue )-July 5 (Fri ) 2019 Zagreb Croatia"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECS52883.2021.00077"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387"},{"key":"ref11","article-title":"Phishing Dataset for Machine Learning: Feature Evaluation","author":"tan","year":"2018","journal-title":"Mendeley Data"},{"key":"ref10","year":"0","journal-title":"Research Methodology Methods and Techniques (PDFDrive)"},{"key":"ref32","first-page":"1165","article-title":"Phishing detection system using machine learning classifiers","volume":"17","author":"zaini","year":"2020","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110945"},{"key":"ref17","article-title":"Phishing Websites Database","year":"2023","journal-title":"PhishTank"},{"key":"ref16","article-title":"What is Google Colab?","author":"raja","year":"2022","journal-title":"Scaler Topics"},{"key":"ref19","year":"2023","journal-title":"Anti-Phishing Working Group (APWG)"},{"key":"ref18","article-title":"OpenPhish Dataset","year":"2023","journal-title":"OpenPhish"},{"key":"ref24","year":"2023","journal-title":"Kaggle"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00041"},{"key":"ref26","author":"breiman","year":"2001","journal-title":"Random Forests"},{"key":"ref25","author":"vrban?i?","year":"2020","journal-title":"Datasets for Phishing Websites Detection"},{"key":"ref20","article-title":"Phishing Websites Dataset","year":"2023","journal-title":"Kaggle"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2011.28"},{"key":"ref21","article-title":"Phishing Datasets","year":"2023","journal-title":"Github"},{"key":"ref28","author":"rish","year":"0","journal-title":"An Empirical Study of the Na&#x00EF;ve Bayes Classifier Predicting conversion to psychosis in clinical high risk patients using resting-state functional MRI features View project Clinical Machine Learning based on Cardiorespiratory models and simulation View project An empirical study of the naive Bayes classifier"},{"key":"ref27","author":"quinlan","year":"1994","journal-title":"Programs for Machine Learning"},{"key":"ref29","author":"altman","year":"1992","journal-title":"An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression"},{"key":"ref8","author":"halfond","year":"2006","journal-title":"A Classification of SQL Injection Attacks and Countermeasures"},{"key":"ref7","article-title":"Special Interest Group on Security","author":"syverson","year":"2008","journal-title":"CCS'08 Proceedings of the 15th ACM Conference on Computer and Communications Security"},{"key":"ref9","first-page":"1","article-title":"International Journal of Computer Science & Information Security","volume":"15","author":"l","year":"2013","journal-title":"International Journal of Information and Computer Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02490-0_66"},{"key":"ref3","author":"chou","year":"0","journal-title":"Client-side defense against web-based identity theft"},{"key":"ref6","author":"stuttard","year":"0","journal-title":"Dafydd Stuttard Marcus Pinto - The web application hacker's handbook_finding and exploiting security flaws- Wiley (2011)"},{"key":"ref5","year":"2022","journal-title":"Phishing E-mail Reports and Phishing Site Trends 4 Brand-Domain Pairs Measurement 5 Brands & Legitimate Entities Hijacked by E-mail Phishing Attacks 6 Use of Domain Names for Phishing 7&#x2013;9 Phishing and Identity Theft in Brazil 10&#x2013;11 Most Targeted Industry Sectors 12 APWG Phishing Trends Report Contributors 13 4 th PHISHING ACTIVITY TRENDS REPORT"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","location":"Penang, Malaysia","start":{"date-parts":[[2023,8,25]]},"end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256280.pdf?arnumber=10256280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:52Z","timestamp":1697478712000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256280","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}