{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:54Z","timestamp":1750306314933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905064","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset"],"prefix":"10.1145","author":[{"given":"Sheetal","family":"Bairwa","sequence":"first","affiliation":[{"name":"Govt. Engineering College, Ajmer"}]},{"given":"Jyoti","family":"Gajrani","sequence":"additional","affiliation":[{"name":"Govt. Engineering College, Ajmer"}]},{"given":"Satyanarayan","family":"Tazi","sequence":"additional","affiliation":[{"name":"Govt. Engineering College, Ajmer"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Winter International Symposium on Information and Communication Technologies","author":"der Merwe Van","year":"2005","unstructured":"Van der Merwe , A J , Loock , M, Dabrowski, \" Characteristics and Responsibilities involved in a Phishing Attack \", Winter International Symposium on Information and Communication Technologies , Cape Town , January 2005 . Van der Merwe, A J, Loock, M, Dabrowski, \"Characteristics and Responsibilities involved in a Phishing Attack\", Winter International Symposium on Information and Communication Technologies, Cape Town, January 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"Koontorm Center. Retrieved","author":"Phishing","year":"2006","unstructured":"Tan, \" Phishing and Spamming via IM(SPIM)\" , Koontorm Center. Retrieved December 5, 2006 . Tan, \"Phishing and Spamming via IM(SPIM)\", Koontorm Center. Retrieved December 5, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"E. Kirda and C. Kruegel \"Protecting Users Against Phishing Attacks with AntiPhish\" 2005  E. Kirda and C. Kruegel \"Protecting Users Against Phishing Attacks with AntiPhish\" 2005","DOI":"10.1093\/comjnl\/bxh169"},{"key":"e_1_3_2_1_4_1","volume-title":"ACM Proceedings","author":"Zhang Y.","year":"2007","unstructured":"Y. Zhang , J. Hong , L. Cranor , \"CANTINA : A Content-Based Approach to Detecting Phishing Web sites \", ACM Proceedings , 2007 Y. Zhang, J. Hong, L. Cranor, \"CANTINA: A Content-Based Approach to Detecting Phishing Web sites\", ACM Proceedings, 2007"},{"key":"e_1_3_2_1_5_1","first-page":"783","author":"Dong Xun","year":"2008","unstructured":"Xun Dong , J. A. Clark , J. L. Jacob , \" User Behaviour Based Phishing Websites Detection\" , Proceedings of the International Multiconference on Computer Science and Information Technology , 2008 , pp. 783 -- 790 Xun Dong, J. A.Clark, J. L.Jacob, \"User Behaviour Based Phishing Websites Detection\", Proceedings of the International Multiconference on Computer Science and Information Technology, 2008, pp. 783--790","journal-title":"Proceedings of the International Multiconference on Computer Science and Information Technology"},{"key":"e_1_3_2_1_6_1","first-page":"373","volume-title":"A Machine Learning Approach","author":"Basnet R.","year":"2008","unstructured":"R. Basnet , S. Mukkamala , A. H. Sung , \" Detection of Phishing Attacks : A Machine Learning Approach \", Springer Proceedings , 2008 , pp. 373 -- 383 R. Basnet, S. Mukkamala, A. H.Sung, \"Detection of Phishing Attacks: A Machine Learning Approach\", Springer Proceedings, 2008, pp. 373--383"},{"key":"e_1_3_2_1_7_1","volume-title":"URL Names Say It All\", arXiv publications","author":"Le A.","year":"2010","unstructured":"A. Le , A. Markopoulou , M. Faloutsos ,\"PhishDef : URL Names Say It All\", arXiv publications , 2010 A. Le, A. Markopoulou, M. Faloutsos,\"PhishDef: URL Names Say It All\", arXiv publications, 2010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"G. Huillier A. Hevia R. Weber S. Rios \"Latent Semantic Analysis and Keyword Extraction for Phishing Classification\" 2010  G. Huillier A. Hevia R. Weber S. Rios \"Latent Semantic Analysis and Keyword Extraction for Phishing Classification\" 2010","DOI":"10.1109\/ISI.2010.5484762"},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/en.wikipedia.org for Machine Learning  http:\/\/en.wikipedia.org for Machine Learning"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of Computational Intelligence and Neuroscience","author":"Shao X.","year":"2013","unstructured":"X. Shao , Kun Wu , B. Liao , \" Single Directional SMO algorithm for least square support vector machines \", In Proceedings of Computational Intelligence and Neuroscience , 2013 X. Shao, Kun Wu, B. Liao, \"Single Directional SMO algorithm for least square support vector machines\", In Proceedings of Computational Intelligence and Neuroscience, 2013"},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/en.wikipedia.org for Particle Swarm Optimization  http:\/\/en.wikipedia.org for Particle Swarm Optimization"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":11,"alternative-id":["10.1145\/2905055.2905064","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905064","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}