{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:47Z","timestamp":1750306247030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,24]],"date-time":"2017-02-24T00:00:00Z","timestamp":1487894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,24]]},"DOI":"10.1145\/3055635.3056583","type":"proceedings-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T18:46:30Z","timestamp":1497465990000},"page":"447-451","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Ensemble Based Identification of Phishing E-Mails"],"prefix":"10.1145","author":[{"family":"Anandita","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, MNNIT, Allahabad, India"}]},{"given":"Dhirendra Pratap","family":"Yadav","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MNNIT, Allahabad, India"}]},{"given":"Priyanka","family":"Paliwal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MNNIT, Allahabad, India"}]},{"given":"Divya","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MNNIT, Allahabad, India"}]},{"given":"Rajesh","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MNNIT, Allahabad, India"}]}],"member":"320","published-online":{"date-parts":[[2017,2,24]]},"reference":[{"volume-title":"Detecting phishing websites using associative classification,\" image","author":"Ajlouni M. I. A.","key":"e_1_3_2_1_1_1","unstructured":"M. I. A. Ajlouni , W. Hadi , and J. Alwedyan , \" Detecting phishing websites using associative classification,\" image , vol. 5 , no. 23, 2013. M. I. A. Ajlouni, W. Hadi, and J. Alwedyan, \"Detecting phishing websites using associative classification,\" image, vol. 5, no. 23, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"M. mahmood Ali and L. Rajamani \"Apd: Arm deceptive phish- ing detector system phishing detection in instant messengers using data mining approach \" in Global Trends in Computing and Communication Systems pp. 490--502 Springer 2012.  M. mahmood Ali and L. Rajamani \"Apd: Arm deceptive phish- ing detector system phishing detection in instant messengers using data mining approach \" in Global Trends in Computing and Communication Systems pp. 490--502 Springer 2012.","DOI":"10.1007\/978-3-642-29219-4_56"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00958-7_40"},{"issue":"7","key":"e_1_3_2_1_5_1","article-title":"Detection of phishing emails using feed forward neural network","volume":"77","author":"Jameel N. G. M.","year":"2013","unstructured":"N. G. M. Jameel and L. E. George , \" Detection of phishing emails using feed forward neural network ,\" International Journal of Computer Applications , vol. 77 , no. 7 , 2013 . N. G. M. Jameel and L. E. George, \"Detection of phishing emails using feed forward neural network,\" International Journal of Computer Applications, vol. 77, no. 7, 2013.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_6_1","article-title":"Detection phishing emails using features decisive values","volume":"2277","author":"Jameel N. G. M.","year":"2013","unstructured":"N. G. M. Jameel and L. E. George , \" Detection phishing emails using features decisive values ,\" International Journal of Ad- vanced Research in Computer Science and Software Engineer- ing, ISSN , vol. 2277 , 2013 . N. G. M. Jameel and L. E. George, \"Detection phishing emails using features decisive values,\" International Journal of Ad- vanced Research in Computer Science and Software Engineer- ing, ISSN, vol. 2277, 2013.","journal-title":"International Journal of Ad- vanced Research in Computer Science and Software Engineer- ing, ISSN"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGCNS.2008.7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2012.1099.1107"},{"key":"e_1_3_2_1_9_1","volume-title":"Improved phishing detection using model-based features,\" in CEAS","author":"Bergholz A.","year":"2008","unstructured":"A. Bergholz , J. H. Chang , G. Paass , F. Reichartz , and S. Strobel , \" Improved phishing detection using model-based features,\" in CEAS , 2008 . A. Bergholz, J. H. Chang, G. Paass, F. Reichartz, and S. Strobel, \"Improved phishing detection using model-based features,\" in CEAS, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.15623\/ijret.2014.0306003"},{"volume-title":"Enhancing phishing e-mail classifiers: a lexical url analysis approach,\" International Jour- nal for Information Security Research (IJISR)","author":"Khonji M.","key":"e_1_3_2_1_11_1","unstructured":"M. Khonji , Y. Iraqi , and A. Jones , \" Enhancing phishing e-mail classifiers: a lexical url analysis approach,\" International Jour- nal for Information Security Research (IJISR) , vol. 2 , no. 1\/2, 2012. M. Khonji, Y. Iraqi, and A. Jones, \"Enhancing phishing e-mail classifiers: a lexical url analysis approach,\" International Jour- nal for Information Security Research (IJISR), vol. 2, no. 1\/2, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.24846\/v22i1y201307"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Information Management and Applications (SKIMA)","author":"Smadi S.","year":"2015","unstructured":"S. Smadi , N. Aslam , L. Zhang , R. Alasem , and M. Hossain , \" Detection of phishing emails using data mining algorithms,\" in 2015 9th International Conference on Software, Knowledge , Information Management and Applications (SKIMA) , pp. 1 -- 8 , IEEE, 2015 . S. Smadi, N. Aslam, L. Zhang, R. Alasem, and M. Hossain, \"Detection of phishing emails using data mining algorithms,\" in 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1--8, IEEE, 2015."},{"key":"e_1_3_2_1_14_1","first-page":"373","volume-title":"Detection of phish- ing attacks: A machine learning approach,\" in Soft Computing Applications in Industry","author":"Basnet R.","year":"2008","unstructured":"R. Basnet , S. Mukkamala , and A. H. Sung , \" Detection of phish- ing attacks: A machine learning approach,\" in Soft Computing Applications in Industry , pp. 373 -- 383 , Springer , 2008 . R. Basnet, S. Mukkamala, and A. H. Sung, \"Detection of phish- ing attacks: A machine learning approach,\" in Soft Computing Applications in Industry, pp. 373--383, Springer, 2008."},{"issue":"2","key":"e_1_3_2_1_15_1","first-page":"206","article-title":"Multi stage phishing email classification","volume":"83","author":"Daeef A. Y.","year":"2016","unstructured":"A. Y. Daeef , R. B. Ahmad , Y. Yacob , N. Yaakob , and K. N. F. K. Azir , \" Multi stage phishing email classification ,\" Journal of Theoretical and Applied Information Technology , vol. 83 , no. 2 , p. 206 , 2016 . A. Y. Daeef, R. B. Ahmad, Y. Yacob, N. Yaakob, and K. N. F. K. Azir, \"Multi stage phishing email classification,\" Journal of Theoretical and Applied Information Technology, vol. 83, no. 2, p. 206,2016.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.103"},{"key":"e_1_3_2_1_18_1","first-page":"311","volume-title":"Learn to detect phish- ing scams using learning and ensemble methods,\" in Proceedings of the 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Workshops","author":"Saberi A.","year":"2007","unstructured":"A. Saberi , M. Vahidi , and B. M. Bidgoli , \" Learn to detect phish- ing scams using learning and ensemble methods,\" in Proceedings of the 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Workshops , pp. 311 -- 314 , IEEE Computer Society , 2007 . A. Saberi, M. Vahidi, and B. M. Bidgoli, \"Learn to detect phish- ing scams using learning and ensemble methods,\" in Proceedings of the 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Workshops, pp. 311--314, IEEE Computer Society, 2007."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Phish- ing email detection based on structural properties,\" in NYS Cyber Security Conference","author":"Chandrasekaran M.","year":"2006","unstructured":"M. Chandrasekaran , K. Narayanan , and S. Upadhyaya , \" Phish- ing email detection based on structural properties,\" in NYS Cyber Security Conference , pp. 1 -- 7 , 2006 . M. Chandrasekaran, K. Narayanan, and S. Upadhyaya, \"Phish- ing email detection based on structural properties,\" in NYS Cyber Security Conference, pp. 1--7, 2006."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"2015 9th International Conference on","author":"Form L. M.","unstructured":"L. M. Form , K. L. Chiew , W. K. Tiong , email detection technique by using hybrid features,\" in IT in Asia TA) , 2015 9th International Conference on , pp. 1 -- 5 , IEEE, 015. L. M. Form, K. L. Chiew, W. K. Tiong, et al., \"Phishing email detection technique by using hybrid features,\" in IT in Asia TA), 2015 9th International Conference on, pp. 1--5, IEEE, 015."}],"event":{"name":"ICMLC 2017: 2017 the 9th International Conference on Machine Learning and Computing","sponsor":["Southwest Jiaotong University"],"location":"Singapore Singapore","acronym":"ICMLC 2017"},"container-title":["Proceedings of the 9th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055635.3056583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:46Z","timestamp":1750220626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,24]]},"references-count":20,"alternative-id":["10.1145\/3055635.3056583","10.1145\/3055635"],"URL":"https:\/\/doi.org\/10.1145\/3055635.3056583","relation":{},"subject":[],"published":{"date-parts":[[2017,2,24]]},"assertion":[{"value":"2017-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}