{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T14:05:23Z","timestamp":1777903523924,"version":"3.51.4"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1109\/ict49546.2020.9239589","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T21:07:10Z","timestamp":1604092030000},"page":"1-5","source":"Crossref","is-referenced-by-count":13,"title":["PhishOut: Effective Phishing Detection Using Selected Features"],"prefix":"10.1109","author":[{"given":"Suhail","family":"Paliath","sequence":"first","affiliation":[]},{"given":"Mohammad Abu","family":"Qbeitah","sequence":"additional","affiliation":[]},{"given":"Monther","family":"Aldwairi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.05.024"},{"key":"ref31","article-title":"Phishing detection using neural network","author":"zhang","year":"2013","journal-title":"Department of Computer Science Department of Statistics Stanford University"},{"key":"ref30","first-page":"169","article-title":"An enhanced online phishing e-mail detection framework based on evolving connectionist system","volume":"9","author":"ahnomani","year":"2013","journal-title":"International Journal of Innovative Computing Information and Control (IJICIC)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017100102"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNLSP.2018.8374391"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1214\/154957805100000140"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The Random Subspace Method for Constructing Decision Forests","volume":"20","author":"ho","year":"1998","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2012.6457802"},{"key":"ref11","author":"nazario","year":"2015","journal-title":"Phishing Corpus"},{"key":"ref12","author":"listk","year":"2017","journal-title":"Phishing Email Detection in Czech Language for Email cz"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24846\/v22i1y201307"},{"key":"ref14","author":"chou","year":"2004","journal-title":"Client-side defense against web-based identity theft"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.386"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2011.5752505"},{"key":"ref17","first-page":"1","article-title":"Phishing email detection based on structural properties","author":"chandrasekaran","year":"2006","journal-title":"NYS Cyber Security Conference"},{"key":"ref18","first-page":"1","article-title":"Collusion attacks in Internet of Things: Detection and mitigation using a fog based model","author":"yaseen","year":"2017","journal-title":"2017 IEEE Sensors Applications Symposium (SAS)"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1299015.1299021","article-title":"A comparison of machine learning techniques for phishing detection","author":"abu-nimeh","year":"2007","journal-title":"Anti-Phishing Working Groups 2nd Annual ECrime Researchers Summit (ECrime)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24669-2_26"},{"key":"ref4","year":"2015","journal-title":"Kaspersky White paper Carbanak APT the greatest bank robbery"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2006.344718"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0062-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2018.8355435"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2010.5706696"},{"key":"ref5","year":"2015","journal-title":"Anti-Phishing Working Group (APWG) Phishing activity trends report"},{"key":"ref8","article-title":"Detection and Analysis of Drive-by-Downloads and Malicious Websites","author":"ibrahim","year":"2019","journal-title":"Seventh International Symposium on Security in Computing and Communications (SSCC&#x2019;19)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.51"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2017.7921994"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5176\/978-981-08-8113-9_ITA29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.34.1381"},{"key":"ref22","first-page":"2333","article-title":"A phishing email detection approach using machine learning techniques","volume":"3","author":"mbah","year":"2017","journal-title":"World Academy of Science Engineering and Technology Computer and Information Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1674"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.352"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2015.7399985"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1145\/1242572.1242660","article-title":"Learning to detect phishing emails","author":"fette","year":"2007","journal-title":"ACM International Conference on World Wide Web"},{"key":"ref25","year":"2015","journal-title":"Apache Apache SpamAssassin Project"}],"event":{"name":"2020 27th International Conference on Telecommunications (ICT)","location":"Bali, Indonesia","start":{"date-parts":[[2020,10,5]]},"end":{"date-parts":[[2020,10,7]]}},"container-title":["2020 27th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9239409\/9239422\/09239589.pdf?arnumber=9239589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:26:24Z","timestamp":1656375984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9239589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ict49546.2020.9239589","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]}}}