{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:01Z","timestamp":1775745781741,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T00:00:00Z","timestamp":1191456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,4]]},"DOI":"10.1145\/1299015.1299021","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"60-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":307,"title":["A comparison of machine learning techniques for phishing detection"],"prefix":"10.1145","author":[{"given":"Saeed","family":"Abu-Nimeh","sequence":"first","affiliation":[{"name":"Southern Methodist University, Dallas, TX"}]},{"given":"Dario","family":"Nappa","sequence":"additional","affiliation":[{"name":"Southern Methodist University, Dallas, TX"}]},{"given":"Xinlei","family":"Wang","sequence":"additional","affiliation":[{"name":"Southern Methodist University, Dallas, TX"}]},{"given":"Suku","family":"Nair","sequence":"additional","affiliation":[{"name":"Southern Methodist University, Dallas, TX"}]}],"member":"320","published-online":{"date-parts":[[2007,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the workshop on Machine Learning in the New Information Age","author":"Androutsopoulos I.","year":"2000"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"e_1_3_2_1_3_1","unstructured":"Anti-Phishing Working Group. http:\/\/www.antiphishing.org\/.  Anti-Phishing Working Group. http:\/\/www.antiphishing.org\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Springer","author":"Berry M. W.","year":"2004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_6_1","unstructured":"L. Breiman J. Friedman C. J. Stone and R. A. Olshen. Classification and Regression Trees. Chapman &amp; Hall\/CRC 1984.  L. Breiman J. Friedman C. J. Stone and R. A. Olshen. Classification and Regression Trees . Chapman &amp; Hall\/CRC 1984."},{"key":"e_1_3_2_1_7_1","volume-title":"NYS Cyber Security Conference","author":"Chandrasekaran M.","year":"2006"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1998.10473750"},{"key":"e_1_3_2_1_9_1","volume-title":"Journal of the Royal Statistical Society","author":"Chipman H. A.","year":"2006"},{"key":"e_1_3_2_1_11_1","volume-title":"Radix Labs","author":"Emigh A.","year":"2005"},{"key":"e_1_3_2_1_12_1","unstructured":"T. Fawcett. Roc graphs: Notes and practical considerations for researchers 2004.  T. Fawcett. Roc graphs: Notes and practical considerations for researchers 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_14_1","volume-title":"McGraw-Hill","author":"S.","year":"1983"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/088342306000000060"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196963"},{"key":"e_1_3_2_1_17_1","unstructured":"L. James. Phishing Exposed. Syngress 2005.   L. James. Phishing Exposed . Syngress 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"Methods and Applications. Springer","author":"Marques de Sa J. P.","year":"2001"},{"key":"e_1_3_2_1_19_1","first-page":"63","volume-title":"USENIX Annual Technical Conference, FREENIX Track","author":"Massey B.","year":"2003"},{"key":"e_1_3_2_1_20_1","volume-title":"Neural and Statistical Classification. Ellis Horwood","author":"Michie D.","year":"1994"},{"key":"e_1_3_2_1_21_1","unstructured":"J. Nazario. Phishing corpus. http:\/\/monkey.org\/jose\/phishing\/phishing2.mbox.  J. Nazario. Phishing corpus. http:\/\/monkey.org\/jose\/phishing\/phishing2.mbox."},{"key":"e_1_3_2_1_22_1","unstructured":"Spambase. ftp:\/\/ftp.ics.uci.edu\/pub\/machine-learning-databases\/spambase\/.  Spambase. ftp:\/\/ftp.ics.uci.edu\/pub\/machine-learning-databases\/spambase\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_24_1","first-page":"446","volume-title":"Proceeding of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL03)","author":"Zhang L.","year":"2003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"}],"event":{"name":"eCrime '07: eCrime '07 - Anti-phishing working group 2007 eCrime Researchers' Summit","location":"Pittsburgh Pennsylvania USA","acronym":"eCrime '07"},"container-title":["Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1299015.1299021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1299015.1299021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:15Z","timestamp":1750278135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1299015.1299021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,4]]},"references-count":24,"alternative-id":["10.1145\/1299015.1299021","10.1145\/1299015"],"URL":"https:\/\/doi.org\/10.1145\/1299015.1299021","relation":{},"subject":[],"published":{"date-parts":[[2007,10,4]]},"assertion":[{"value":"2007-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}