{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:11:36Z","timestamp":1764079896406},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131884","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"source":"Crossref","is-referenced-by-count":8,"title":["Feature Selection for Phishing Website by Using Naive Bayes Classifier"],"prefix":"10.1109","author":[{"given":"Twana","family":"Mustafa","sequence":"first","affiliation":[{"name":"F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey"}]},{"given":"Murat","family":"Karabatak","sequence":"additional","affiliation":[{"name":"F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"APWG Phishing Reports","author":"Aaron","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CEC55065.2022.9870360"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355357"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3166474"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116305"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21608\/ijicis.2023.167424.1223"},{"key":"ref7","volume-title":"Data mining: concepts and techniques","author":"Han","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108351"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/9781003139416"},{"key":"ref10","author":"Korkmaz","journal-title":"Data Mining in Finance: Concepts, Trend and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95918-0_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11846-023-00645-w"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3084131"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02375-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116339"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v25.i3.pp1771-1776"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.25126\/jitecs.202271351"},{"key":"ref18","volume-title":"Applied machine learning","author":"Gopal","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-021-00351-7"},{"key":"ref20","article-title":"Img2Tab: Automatic Class Relevant Concept Discovery from StyleGAN Features for Explainable Image Classification","author":"Song","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103121"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04034-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110945"},{"key":"ref24","author":"Barbind","year":"2022","journal-title":"Detection Of Phishing Websites Using Data Mining"},{"key":"ref25","article-title":"Phishing: General Information"},{"key":"ref26","article-title":"UCI Machine Learning Repository: Phishing Websites Data Set"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.29407\/intensif.v7i1.18283"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3170038"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","location":"Chattanooga, TN, USA","start":{"date-parts":[[2023,5,11]]},"end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131884.pdf?arnumber=10131884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T05:50:06Z","timestamp":1709272206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131884","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}