{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:57:18Z","timestamp":1776085038029,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,29]]},"DOI":"10.1109\/is61756.2024.10705257","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:15Z","timestamp":1728495915000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["\u201cHybrid Machine Learning Model for Phishing Detection\u201d"],"prefix":"10.1109","author":[{"given":"Perceval","family":"Maturure","sequence":"first","affiliation":[{"name":"School of Computing, University of Portsmouth,United Kingdom"}]},{"given":"Asim","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,United Kingdom"}]},{"given":"Alexander","family":"Gegov","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103364"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106438"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.032213.00009"},{"key":"ref4","volume-title":"Prevalence, Impact, of data breaches and and cyber attacks","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.01.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3247135"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0034-3"},{"key":"ref8","volume-title":"Phishing Detection Using Machine Learning Techniques","author":"Shahrivari","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36826-5_10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2942584"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121183"},{"key":"ref12","article-title":"URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network","volume":"123AD","author":"Tools","journal-title":"Multimed Tools Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103398"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3243082.3243111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2010.5569740"},{"key":"ref17","doi-asserted-by":"crossref","volume-title":"Intelligent Phishing Website Detection using Random Forest Classifier","author":"Subasi","DOI":"10.1109\/ICECTA.2017.8252051"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.402"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/fskd.2007.552"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.beth.2020.05.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITOEC53115.2022.9734474"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016908471"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2019.8862580"},{"key":"ref25","volume-title":"Bharati Vidyapeeths Institute of Computer Applications and Management (BVICAM)","author":"Singh","year":"2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJBRA.2023.133695"},{"key":"ref27","volume":"1","author":"Tamal","year":"2023","journal-title":"Mendeley Data"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7137-4_49"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.334214"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE51753.2021.9431794"},{"key":"ref31","volume-title":"Introduction to Machine Learning","author":"Andrews","year":"2024"},{"key":"ref32","volume-title":"Phishing detection code base repository","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2021.0120480"}],"event":{"name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","location":"Varna, Bulgaria","start":{"date-parts":[[2024,8,29]]},"end":{"date-parts":[[2024,8,31]]}},"container-title":["2024 IEEE 12th International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10705133\/10705164\/10705257.pdf?arnumber=10705257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:21:24Z","timestamp":1728580884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/is61756.2024.10705257","relation":{},"subject":[],"published":{"date-parts":[[2024,8,29]]}}}