{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:10:55Z","timestamp":1767262255844,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/sera57763.2023.10197758","type":"proceedings-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T17:29:18Z","timestamp":1691083758000},"page":"77-83","source":"Crossref","is-referenced-by-count":11,"title":["Phishy? Detecting Phishing Emails Using ML and NLP"],"prefix":"10.1109","author":[{"given":"Md Fazle","family":"Rabbi","sequence":"first","affiliation":[{"name":"Idaho State University,Department of Computer Science,USA"}]},{"given":"Arifa I.","family":"Champa","sequence":"additional","affiliation":[{"name":"Idaho State University,Department of Computer Science,USA"}]},{"given":"Minhaz F.","family":"Zibran","sequence":"additional","affiliation":[{"name":"Idaho State University,Department of Computer Science,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4470-8"},{"journal-title":"The Online Phishing Corpus","year":"2023","author":"nazario","key":"ref35"},{"journal-title":"Hands-On Machine Learning with Scikit-Learn Keras and TensorFlow","year":"2022","author":"g\u00e9ron","key":"ref12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2892646"},{"journal-title":"Apache SpamAssassin","year":"2023","author":"schwartz","key":"ref36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6737080"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0790-8_6"},{"journal-title":"Preprocessed TREC 2007 Public Corpus Dataset","year":"2023","author":"chatterjee","key":"ref11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108826"},{"key":"ref10","first-page":"274","article-title":"Trec 2007 spam track overview","volume":"500","author":"cormack","year":"2007","journal-title":"Proc of the 16th Text REtrieval Conference (TREC)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39303-8_17"},{"journal-title":"Phishing Activity Trends Reports","year":"2023","key":"ref2"},{"journal-title":"2020 Phishing and Fraud Report","year":"2023","author":"warburton","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167296"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.08.030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.90"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297455"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SERA54885.2022.9806772"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SERA54885.2022.9806745"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006282"},{"key":"ref25","first-page":"1","article-title":"Are we aware? an empirical study on the privacy and security awareness of smartphone sensors","author":"champa","year":"2023","journal-title":"21st IEEE International Conference on Software Engineering Management and Applications (SERA)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SERA51205.2021.9509274"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SERA51205.2021.9509271"},{"key":"ref28","first-page":"51","article-title":"Detecting phishing e-mail using machine learning techniques","author":"unnithan","year":"2018","journal-title":"Proc 1st Anti-Phishing Shared Task Pilot 4th ACM IWSPA Co-Located 8th ACM Conf Data Appl Secur Privacy (CODASPY)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO51393.2021.9596218"},{"key":"ref29","first-page":"685","article-title":"Email spam detection using integrated approach of na&#x00EF;ve bayes and particle swarm optimization","author":"agarwal","year":"2018","journal-title":"2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)"},{"key":"ref8","first-page":"1881","article-title":"A survey on automatic phishing email detection using natural language processing techniques","volume":"6","author":"mukherjee","year":"2019","journal-title":"Int Res J Eng Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2957750"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"journal-title":"The State of Email Security 2023 (E-book)","year":"2023","key":"ref4"},{"journal-title":"How to Stop Phishing Attacks (Whitepaper)","year":"2023","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2752087"},{"key":"ref5","article-title":"Typo led to podesta email hack: Report","volume":"13","author":"uchill","year":"2016","journal-title":"The Hill"}],"event":{"name":"2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2023,5,23]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10197651\/10197644\/10197758.pdf?arnumber=10197758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:46:08Z","timestamp":1692639968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10197758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/sera57763.2023.10197758","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}