{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:35:44Z","timestamp":1773326144493,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284100","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"102-107","source":"Crossref","is-referenced-by-count":20,"title":["Phishing website detection using Latent Dirichlet Allocation and AdaBoost"],"prefix":"10.1109","author":[{"given":"Venkatesh","family":"Ramanathan","sequence":"first","affiliation":[]},{"given":"Harry","family":"Wechsler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"17","year":"0"},{"key":"18","first-page":"115","article-title":"A short introduction to boosting","author":"freund","year":"1995","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"key":"15","article-title":"Expectation-propagation for the generative aspect model","author":"minka","year":"0","journal-title":"Proceedings of the 18th Conference in Uncertainity in Artificial Intelligence 2002"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"11","article-title":"Phishing on mobile devices","author":"felt","year":"2011","journal-title":"Web 2 0 Security & Privacy 2011"},{"key":"12","year":"0","journal-title":"Anonymity Online"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/11564126_72"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543241"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279985"},{"key":"26","first-page":"338","article-title":"Estimating continuous distributions in bayesian classifiers","author":"john","year":"1995","journal-title":"11th Conference on Uncertainty in Artificial Intelligence San Mateo"},{"key":"27","year":"0"},{"key":"28","year":"0"},{"key":"29","year":"0"},{"key":"3","year":"0","journal-title":"Trustee"},{"key":"2","year":"2012","journal-title":"Mobile Commerce Daily"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030396"},{"key":"1","year":"0","journal-title":"Phishing Activity Trends Report"},{"key":"30","year":"0","journal-title":"Tesseract"},{"key":"7","article-title":"A feature-rich machine learning framework for detecting phishing websites","volume":"14","author":"xiang","year":"2011","journal-title":"ACM Transaction on Information Systems Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.046"},{"key":"5","article-title":"Anti-phishing by discovering phishing target","author":"wenyin","year":"2011","journal-title":"IEEE Internet Computing"},{"key":"31","year":"0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MCIT.2010.5444840"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2161999"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2011.5752505"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","location":"Washington, DC, USA","start":{"date-parts":[[2012,6,11]]},"end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284100.pdf?arnumber=6284100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:43:42Z","timestamp":1490114622000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284100","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}