{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:25:16Z","timestamp":1772033116658,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,22]]},"DOI":"10.1109\/isncc62547.2024.10759011","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:45:16Z","timestamp":1732646716000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Real-Time Email Phishing Detection Using a Custom DistilBERT Model"],"prefix":"10.1109","author":[{"given":"Edafe Maxwell","family":"Damatie","sequence":"first","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,England"}]},{"given":"Amna","family":"Eleyan","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,England"}]},{"given":"Tarek","family":"Bejaoui","sequence":"additional","affiliation":[{"name":"University of Carthage,Computer Engineering Department,Tunisia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.c6527.098319"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.135"},{"key":"ref4","article-title":"DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter","author":"Sanh","year":"2019","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/csnet47905.2019.9108961"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.17762\/ijritcc.v11i9s.7674","article-title":"Deep Learning Multi-Agent Model for Phishing Cyber-attack Detection","volume-title":"International Journal on Recent and Innovation Trends in Computing and Communication","author":"Kaushik","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3137636"},{"key":"ref9","volume-title":"Phishing Email Dataset","author":"Alam","year":"2021"},{"key":"ref10","volume-title":"Gmail API overview, Google Developers","author":"Developers","year":"2024"},{"issue":"18","key":"ref11","first-page":"4375","article-title":"A survey of social engineering attacks: Detection and prevention tools","volume":"99","author":"Odeh","year":"2021","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/smartnets55823.2022.9993984"},{"issue":"6","key":"ref13","first-page":"10","article-title":"Social engineering attacks: A phishing case simulation","volume":"10","author":"Ammar","year":"2021","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/isncc58260.2023.10323826"}],"event":{"name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Washington DC, DC, USA","start":{"date-parts":[[2024,10,22]]},"end":{"date-parts":[[2024,10,25]]}},"container-title":["2024 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10758900\/10758934\/10759011.pdf?arnumber=10759011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T08:42:39Z","timestamp":1732696959000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10759011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isncc62547.2024.10759011","relation":{},"subject":[],"published":{"date-parts":[[2024,10,22]]}}}