{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T13:49:09Z","timestamp":1774014549711,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004877","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T16:42:42Z","timestamp":1502383362000},"page":"72-77","source":"Crossref","is-referenced-by-count":67,"title":["Phishing detection: A recent intelligent machine learning comparison based on models content and features"],"prefix":"10.1109","author":[{"given":"Neda","family":"Abdelhamid","sequence":"first","affiliation":[]},{"given":"Fadi","family":"Thabtah","sequence":"additional","affiliation":[]},{"given":"Hussein","family":"Abdel-jaber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.06.041"},{"key":"ref10","year":"0","journal-title":"eBay Toolbar Guard (n d )"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00962234"},{"key":"ref14","volume":"11","author":"hall","year":"2009","journal-title":"The WEKA Data Mining Software An Update SIGKDD Explorations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"ref16","year":"0","journal-title":"McAfee Inc (n d ) McAfee SiteAdvisor"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.04.001"},{"key":"ref18","author":"mohammad","year":"0","journal-title":"Phishing websites dataset"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1490-z"},{"key":"ref28","year":"0","journal-title":"Spoof Stick Toolbar (n d )"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-010-9042-7"},{"key":"ref27","article-title":"C4.5: Programs for machine learning","author":"quinlan","year":"1993","journal-title":"San Mateo CA Morgan Kaufmann"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649214500270"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/425731"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1721-6_15"},{"key":"ref5","article-title":"PhishZoo: Detecting Phishing Websites by Looking at Them","year":"2011","journal-title":"Fifth International Conference on Semantic Computing (September 18-September 21)"},{"key":"ref8","article-title":"Bayesian network classifiers in Weka","author":"bouckaert","year":"2004","journal-title":"(Working paper series University of Waikato Department of Computer Science"},{"key":"ref7","first-page":"373","author":"basnet","year":"2008","journal-title":"Detection of phishing attacks A machine learning approach (2008) Soft Computing Applications Industry"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"ref9","author":"bright","year":"2011","journal-title":"Miller"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2014.07.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0202"},{"key":"ref22","year":"0","journal-title":"Netcraft Inc (n d ) Netcraft Anti-Phishing Toolbar"},{"key":"ref21","first-page":"682","article-title":"Predicting Phishing Websites using Neural Network trained with Back-Propagation","author":"mohammad","year":"2013","journal-title":"Las Vigas W orld Congress in Computer Science Computer Engineering and Applied Computing"},{"key":"ref24","year":"2011","journal-title":"PhishTank"},{"key":"ref23","year":"0","journal-title":"Netscape Communications (n d )"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2015.1090889"},{"key":"ref25","first-page":"185","article-title":"Fast training of SVM using sequential optimization","author":"platt","year":"1998","journal-title":"Advances in Kernel Methods Support Vector Learning"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Beijing, China","start":{"date-parts":[[2017,7,22]]},"end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004877.pdf?arnumber=8004877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T19:44:14Z","timestamp":1503517454000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004877","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}