{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:26:22Z","timestamp":1770060382791,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1109\/isi49825.2020.9280509","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T05:41:06Z","timestamp":1607492466000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks"],"prefix":"10.1109","author":[{"given":"Syed Hasan","family":"Amin Mahmood","sequence":"first","affiliation":[]},{"given":"Syed","family":"Mustafa Ali Abbasi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"Fareed","family":"Zaffar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"The phishing funnel model: A design artifact to predict user susceptibility to phishing attacks","author":"abbasi","year":"2021","journal-title":"Information Systems Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2161999"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"ref14","article-title":"Financial time series forecasting with deep learning : A systematic literature review: 2005-2019","author":"sezer","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0016-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/580"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625145"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587350"},{"key":"ref19","article-title":"Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model","author":"filonov","year":"2016","journal-title":"NIPS Time Series Workshop"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355131"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0522"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00399"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745462"},{"key":"ref2","article-title":"Twitter says spear-phishing attack on employees led to breach","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20633-7_18"},{"key":"ref1","article-title":"Phishing activity trends reports","year":"0"},{"key":"ref20","article-title":"Time series forecasting with deep learning: A survey","author":"lim","year":"2020"},{"key":"ref22","article-title":"Deep learning for time series forecasting: The electric load case","author":"gasparin","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(02)00036-0"},{"key":"ref24","article-title":"Comprehensive analysis of time series forecasting using neural networks","author":"tadayon","year":"2020"},{"key":"ref23","article-title":"Deep transformer models for time series forecasting: The influenza prevalence case","author":"wu","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745439"}],"event":{"name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Arlington, VA, USA","start":{"date-parts":[[2020,11,9]]},"end":{"date-parts":[[2020,11,10]]}},"container-title":["2020 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9280504\/9280475\/09280509.pdf?arnumber=9280509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:08Z","timestamp":1656453068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9280509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isi49825.2020.9280509","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}