{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T17:21:17Z","timestamp":1770571277570,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tkde.2025.3609320","type":"journal-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:31:52Z","timestamp":1757698312000},"page":"6597-6609","source":"Crossref","is-referenced-by-count":1,"title":["PRIME: A Phishing Detection Framework With Quantitative and Fuzzy-Based Dual Validation"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7026-5067","authenticated-orcid":false,"given":"Yicun","family":"Tian","sequence":"first","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3122-6745","authenticated-orcid":false,"given":"Shigang","family":"Liu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9429-8957","authenticated-orcid":false,"given":"Pei-Wei","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.716"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s24072077"},{"key":"ref7","article-title":"Apache spamassassin","year":"2024"},{"key":"ref8","article-title":"Whaling & spear phishing","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SEB4SDG60871.2024.10630203"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3555500"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103545"},{"key":"ref12","article-title":"Are you actually using e-mail securely?","year":"2024"},{"key":"ref13","article-title":"Counter-phishing recommendations for federal agencies","year":"2023"},{"key":"ref14","article-title":"How to combat fake Emails","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3733049"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR61006.2024.10533010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913705"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21236\/ADA456046"},{"key":"ref19","article-title":"David versus goliath: Can machine learning detect LLM-generated text? A case study in the detection of phishing Emails","volume-title":"Proc. Italian Conf. CyberSecurity","volume":"3731","author":"Greco"},{"key":"ref20","article-title":"Trezor issues phishing alert after attackers abuse support contact form to send scam emails","author":"Hunt","year":"2025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"ref22","article-title":"How to recognize and avoid phishing scams","author":"Kim","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-94455-0_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3737295"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13193823"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"ref27","article-title":"EXPLICATE: Enhancing phishing detection through explainable AI and LLM-powered interpretability","author":"Lim","year":"2025"},{"key":"ref28","article-title":"Prompted contextual vectors for spear-phishing detection","author":"Nahmias","year":"2024"},{"key":"ref29","article-title":"Phishing corpus","author":"Nazario","year":"2005"},{"key":"ref30","article-title":"Phishing attacks: Defending your organisation","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS65363.2025.11012014"},{"key":"ref32","article-title":"AI2TALE: An innovative information theory-based approach for learning to localize phishing attacks","volume-title":"Proc. 13th Int. Conf. Learn. Representations","author":"Nguyen"},{"key":"ref33","article-title":"Phishing attacks and how to protect against them","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2012.6510259"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00182"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.077"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10973-2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714593"},{"key":"ref39","article-title":"A roundup of the top phishing attacks in 2024 so far","author":"Slavin","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyae021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2019.23028"},{"key":"ref43","article-title":"Qantas executives slow to be seen after data breach affecting up to 6 million customers","author":"Verrender","year":"2025"},{"key":"ref44","article-title":"Phishing","year":"2024"},{"key":"ref45","article-title":"HACK ATTACK: Scots schools hit by cyber attack as exam revision thrown into chaos","author":"Williamson","year":"2025"},{"key":"ref46","article-title":"Multiphishguard: An LLM-based multi-agent system for phishing email detection","author":"Xue","year":"2025"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380313"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SEAI62072.2024.10674290"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/11197180\/11162598.pdf?arnumber=11162598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:55:24Z","timestamp":1760032524000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11162598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":46,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2025.3609320","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}