{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:37:54Z","timestamp":1759091874236,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1145\/2030376.2030392","type":"proceedings-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:28Z","timestamp":1315917808000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A study of feature subset evaluators and feature subset searching methods for phishing classification"],"prefix":"10.1145","author":[{"given":"Mahmoud","family":"Khonji","sequence":"first","affiliation":[{"name":"Khalifa University, Sharjah, UAE"}]},{"given":"Andrew","family":"Jones","sequence":"additional","affiliation":[{"name":"Khalifa University, Sharjah, UAE and Edith Cowan University"}]},{"given":"Youssef","family":"Iraqi","sequence":"additional","affiliation":[{"name":"Khalifa University, Sharjah, UAE"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"volume-title":"http:\/\/www.wombatsecurity.com\/phishguru. Accessed","year":"2011","unstructured":"Phishguru. http:\/\/www.wombatsecurity.com\/phishguru. Accessed March 2011 . Phishguru. http:\/\/www.wombatsecurity.com\/phishguru. Accessed March 2011.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1299015.1299021"},{"key":"e_1_3_2_1_3_1","volume-title":"An anti-phishing approach that uses training intervention for phishing websites detection","author":"Alnajim A.","year":"2009","unstructured":"A. Alnajim and M. Munro . An anti-phishing approach that uses training intervention for phishing websites detection . 2009 . A. Alnajim and M. Munro. An anti-phishing approach that uses training intervention for phishing websites detection. 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1017\/S0269888906220745"},{"key":"e_1_3_2_1_5_1","first-page":"7","volume":"18","author":"Bergholz A.","year":"2010","unstructured":"A. Bergholz , J. De Beer , S. Glahn , M.-F. Moens , G. Paa\u00df , and S. Strobel . New filtering approaches for phishing email. J. Comput. Secur. , 18 : 7 -- 35 , January 2010 . A. Bergholz, J. De Beer, S. Glahn, M.-F. Moens, G. Paa\u00df, and S. Strobel. New filtering approaches for phishing email. J. Comput. Secur., 18:7--35, January 2010.","journal-title":"New filtering approaches for phishing email. J. Comput. Secur."},{"key":"e_1_3_2_1_6_1","volume-title":"NYS Cyber Security Conference","author":"Chandrasekaran M.","year":"2006","unstructured":"M. Chandrasekaran , K. Narayanan , and S. Upadhyaya . Phishing email detection based on structural properties . In NYS Cyber Security Conference , 2006 . M. Chandrasekaran, K. Narayanan, and S. Upadhyaya. Phishing email detection based on structural properties. In NYS Cyber Security Conference, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1242572.1242660"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-642-00958-7_40"},{"key":"e_1_3_2_1_9_1","volume-title":"Correlation-based feature selection for machine learning","author":"Hall M. A.","year":"1998","unstructured":"M. A. Hall . Correlation-based feature selection for machine learning . 1998 . M. A. Hall. Correlation-based feature selection for machine learning. 1998."},{"unstructured":"M. Khonji. Phishing studies. http:\/\/khonji.org\/index.php\/Phishing_Studies. Accessed April 2011.  M. Khonji. Phishing studies. http:\/\/khonji.org\/index.php\/Phishing_Studies. Accessed April 2011.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/S0004-3702(97)00043-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_2_1_13_1","volume-title":"B-apt: Bayesian anti-phishing toolbar","author":"Likarish P.","year":"2008","unstructured":"P. Likarish , D. Dunbar , and T. E. Hansen . B-apt: Bayesian anti-phishing toolbar . 2008 . P. Likarish, D. Dunbar, and T. E. Hansen. B-apt: Bayesian anti-phishing toolbar. 2008."},{"key":"e_1_3_2_1_14_1","first-page":"319","volume-title":"A probabilistic approach to feature selection - a filter solution","author":"Liu H.","unstructured":"H. Liu and R. Setiono . A probabilistic approach to feature selection - a filter solution . pages 319 -- 327 . Morgan Kaufmann . H. Liu and R. Setiono. A probabilistic approach to feature selection - a filter solution. pages 319--327. Morgan Kaufmann."},{"unstructured":"J. Nazario. Phishing corpus. http:\/\/monkey.org\/~jose\/wiki\/doku.php?id=phishingcorpus. Accessed July 2010.  J. Nazario. Phishing corpus. http:\/\/monkey.org\/~jose\/wiki\/doku.php?id=phishingcorpus. Accessed July 2010.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/1833515.1833585"},{"unstructured":"R. Quinlan. Data mining tools see5 and c5.0. http:\/\/www.rulequest.com\/see5-info.html. Accessed April 2011.  R. Quinlan. Data mining tools see5 and c5.0. http:\/\/www.rulequest.com\/see5-info.html. Accessed April 2011.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1280680.1280692"},{"unstructured":"SpamAssassin. Public corpus. http:\/\/spamassassin.apache.org\/publiccorpus\/. Accessed January 2011.  SpamAssassin. Public corpus. http:\/\/spamassassin.apache.org\/publiccorpus\/. Accessed January 2011.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Phishing detection using classifier ensembles. In eCrime Researchers Summit","author":"Toolan F.","year":"2009","unstructured":"F. Toolan and J. Carthy . Phishing detection using classifier ensembles. In eCrime Researchers Summit , 2009 . eCRIME '09., pages 1 -- 9 , 20 2009-oct. 21 2009. F. Toolan and J. Carthy. Phishing detection using classifier ensembles. In eCrime Researchers Summit, 2009. eCRIME '09., pages 1--9, 20 2009-oct. 21 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"Feature selection for spam and phishing detection. In eCrime Researchers Summit (eCrime)","author":"Toolan F.","year":"2010","unstructured":"F. Toolan and J. Carthy . Feature selection for spam and phishing detection. In eCrime Researchers Summit (eCrime) , 2010 , eCrime '10, Dallas , TX , 2010. F. Toolan and J. Carthy. Feature selection for spam and phishing detection. In eCrime Researchers Summit (eCrime), 2010, eCrime '10, Dallas, TX, 2010."},{"unstructured":"W. University. Weka 3: Data mining software in java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. Accessed January 2011.  W. University. Weka 3: Data mining software in java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. Accessed January 2011.","key":"e_1_3_2_1_22_1"},{"unstructured":"C. Whittaker B. Ryner and M. Nazif. Large-scale automatic classification of phishing pages. http:\/\/research.google.com\/pubs\/pub35580.html. Accessed July 2010.  C. Whittaker B. Ryner and M. Nazif. Large-scale automatic classification of phishing pages. http:\/\/research.google.com\/pubs\/pub35580.html. Accessed July 2010.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten I. H.","year":"2011","unstructured":"I. H. Witten , E. Frank , and M. A. Hall . Data Mining: Practical Machine Learning Tools and Techniques ( Third Edition). Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 2011 . I. H. Witten, E. Frank, and M. A. Hall. Data Mining: Practical Machine Learning Tools and Techniques (Third Edition). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2011."}],"event":{"acronym":"CEAS '11","name":"CEAS '11: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","location":"Perth Australia"},"container-title":["Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030376.2030392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":24,"alternative-id":["10.1145\/2030376.2030392","10.1145\/2030376"],"URL":"https:\/\/doi.org\/10.1145\/2030376.2030392","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}