{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:15:42Z","timestamp":1774685742228,"version":"3.50.1"},"reference-count":10,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:p> Classification is one of the major tasks in data mining which aims to build classifiers for decision making. One of the most recent online threats is phishing, which has caused significant losses to online shoppers, electronic businesses and financial institutions. A common way of phishing is impersonating online websites to deceive online users and steal their financial information. One way to guide the anti-phishing classification method is to preliminarily identify a minimal set of related features so the search space can be reduced. The aim of this paper is to compare different features assessment techniques in the website phishing context in order to determine the minimal set of features for detecting phishing activities. Experimental results on real phishing datasets consisting of 30 features has been conducted using three known features selection methods. New features cutoffs have been identified after statistical analysis utilising three data mining classification methods. We have been able to identify new clusters of features that when used together are able to detect phishing activities. Further, important correlations among common features have been derived. <\/jats:p>","DOI":"10.1142\/s0219649216500428","type":"journal-article","created":{"date-parts":[[2016,11,27]],"date-time":"2016-11-27T22:22:41Z","timestamp":1480285361000},"page":"1650042","source":"Crossref","is-referenced-by-count":20,"title":["Deriving Correlated Sets of Website Features for Phishing Detection: A Computational Intelligence Approach"],"prefix":"10.1142","volume":"15","author":[{"given":"Fadi","family":"Thabtah","sequence":"first","affiliation":[{"name":"Applied Business and Computing, Nelson Marlborough Institute of Technology, Auckland, New Zealand"}]},{"given":"Neda","family":"Abdelhamid","sequence":"additional","affiliation":[{"name":"Information Technology, Auckland Institute of Studies, Auckland, New Zealand"}]}],"member":"219","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"S0219649216500428BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"S0219649216500428BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31087-4_27"},{"issue":"3","key":"S0219649216500428BIB010","first-page":"1","author":"Mohammad R","year":"2014","journal-title":"Journal of Neural Computing and Applications"},{"key":"S0219649216500428BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"S0219649216500428BIB014","volume-title":"C4.5: Programs for Machine Learning","author":"Quinlan J","year":"1993"},{"key":"S0219649216500428BIB016","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626413500126"},{"key":"S0219649216500428BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.06.041"},{"key":"S0219649216500428BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.08.050"},{"key":"S0219649216500428BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2013.02.005"},{"key":"S0219649216500428BIB021","first-page":"221","volume":"6","author":"Zuhir H","year":"2015","journal-title":"International Journal of Advanced Computer Science and Applications"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219649216500428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T16:20:54Z","timestamp":1565108454000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219649216500428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":10,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2016,12,29]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1142\/S0219649216500428"],"URL":"https:\/\/doi.org\/10.1142\/s0219649216500428","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"value":"0219-6492","type":"print"},{"value":"1793-6926","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}