{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:36Z","timestamp":1750308576064,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175690","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"125-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Advanced Phishing Filter Using Autoencoder and Denoising Autoencoder"],"prefix":"10.1145","author":[{"given":"Samira","family":"Douzi","sequence":"first","affiliation":[{"name":"University Mohammed V, Rabat, Morocco"}]},{"given":"Meryem","family":"Amar","sequence":"additional","affiliation":[{"name":"University Mohammed V, Rabat, Morocco"}]},{"given":"Bouabid","family":"El Ouahidi","sequence":"additional","affiliation":[{"name":"University Mohammed V, Rabat, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Phishing attacks and countermeasures. Ramzan Zulfikar (2010). 2010 Handbook of Information and Communication Security. Springer. ISBN 9783642041174.  Phishing attacks and countermeasures. Ramzan Zulfikar (2010). 2010 Handbook of Information and Communication Security. Springer. ISBN 9783642041174."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.130"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_7_1","volume-title":"Fourth conference on Email and Anti- Spam Mountain view: Citeseer","author":"Attacks Phishing","year":"2007","unstructured":"Phishing Attacks : Analyzing Trends in 2006. Ramzan, Z., & W\u00fcest, C . In Fourth conference on Email and Anti- Spam Mountain view: Citeseer , 2007 . Phishing Attacks: Analyzing Trends in 2006. Ramzan, Z., & W\u00fcest, C. In Fourth conference on Email and Anti- Spam Mountain view: Citeseer, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70065-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.76"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.142"},{"key":"e_1_3_2_1_11_1","volume-title":"Jun-2014","volume":"03","author":"LEARNING TO DETECT PHISHING URLs.","unstructured":"LEARNING TO DETECT PHISHING URLs. al, Ram B. Basnet et. s.l.: International Journal of Research in Engineering and Technology , Jun-2014 , Vol. Volume: 03 Issue : 06 . LEARNING TO DETECT PHISHING URLs. al, Ram B. Basnet et. s.l.: International Journal of Research in Engineering and Technology, Jun-2014, Vol. Volume: 03 Issue: 06."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the CEAS'09","author":"Zhang J.","year":"2009","unstructured":"Sheng, S.,Wardman, B.,Warner, G., Cranor, L., Hong, J. and Zhang , C . An empirical analysis of phishing blacklists ,. In Proceedings of the CEAS'09 , 2009 . Sheng, S.,Wardman, B.,Warner, G., Cranor, L., Hong, J. and Zhang, C. An empirical analysis of phishing blacklists,. In Proceedings of the CEAS'09, 2009."},{"key":"e_1_3_2_1_13_1","unstructured":"Detection of phishing attacks: a machine learning approach Soft Computing Applications in Industry (2008) 373--383. R. Basnet S. Mukkamala A. Sung .  Detection of phishing attacks: a machine learning approach Soft Computing Applications in Industry (2008) 373--383. R. Basnet S. Mukkamala A. Sung ."},{"key":"e_1_3_2_1_14_1","author":"Obtaining","year":"2011","unstructured":"Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. ( 2011 ),. C.K. Olivo, et al. Obtaining the threat model for e-mail phishing. Appl. Soft Comput. J. (2011),. C.K. Olivo, et al.","journal-title":"Appl. Soft Comput. J. ("},{"key":"e_1_3_2_1_15_1","unstructured":"Online detection and prevention of phishing attacks. J. Chen C. Guo . s.l.: Communications and Networking in China (2006) 19--21.  Online detection and prevention of phishing attacks. J. Chen C. Guo . s.l.: Communications and Networking in China (2006) 19--21."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.56"},{"key":"e_1_3_2_1_17_1","volume-title":"Raymond Chiong and Seibu Mary Jacob. s.l.: at www.arxiv.org","author":"Phishing Attacks Analysis","year":"2006","unstructured":"Analysis of Phishing Attacks and Countermeasures. Biju Issac , Raymond Chiong and Seibu Mary Jacob. s.l.: at www.arxiv.org ., 2006 . Analysis of Phishing Attacks and Countermeasures. Biju Issac, Raymond Chiong and Seibu Mary Jacob. s.l.: at www.arxiv.org., 2006."},{"volume-title":"2013 AASRI Conference on Intelligent systems and control, Procedia 4 (2013)","author":"An Implementation Detecting Malicious","key":"e_1_3_2_1_18_1","unstructured":"Detecting Malicious URLs in E-mail- An Implementation , 2013 AASRI Conference on Intelligent systems and control, Procedia 4 (2013) 125--131. Dhanalakshmi Ranganayakulu, Chellappan C. Detecting Malicious URLs in E-mail- An Implementation,2013 AASRI Conference on Intelligent systems and control, Procedia 4 (2013) 125--131. Dhanalakshmi Ranganayakulu, Chellappan C."},{"key":"e_1_3_2_1_19_1","volume-title":"s.l.: International Conference on Communication Technology and System Design","author":"Santhana Efficient","year":"2011","unstructured":"Efficient prediction of phishing websites using supervised learning algorithms. Santhana Lakshmi V, Vijaya MS. s.l.: International Conference on Communication Technology and System Design 2011 ,Procedia Engineering 30 (2012) 798 -- 805. Efficient prediction of phishing websites using supervised learning algorithms. Santhana Lakshmi V, Vijaya MS. s.l.: International Conference on Communication Technology and System Design 2011,Procedia Engineering 30 (2012) 798 -- 805."},{"key":"e_1_3_2_1_20_1","first-page":"242","volume":"2","author":"Aburrous Maher","year":"2010","unstructured":"Maher Aburrous , Hossain, M.A. , KeshavDahal and FadiThabtah. \" Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cognitive Computing ,Vol. 2 , pp. 242 -- 253 . 2010 . Maher Aburrous, Hossain, M.A., KeshavDahal and FadiThabtah. \"Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cognitive Computing,Vol. 2, pp. 242--253. 2010.","journal-title":"Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cognitive Computing"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.22"},{"key":"e_1_3_2_1_24_1","volume-title":"s.l.: Neurocomputing","author":"Autoencoder Trees Unsupervised Feature","year":"2017","unstructured":"Unsupervised Feature Extraction with Autoencoder Trees . Ozan \u00fa Irsoy , Ethem Alpayd\u00f5n . s.l.: Neurocomputing ( 2017 ). Unsupervised Feature Extraction with Autoencoder Trees. Ozan \u00faIrsoy, Ethem Alpayd\u00f5n. s.l.: Neurocomputing (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2017.03.034"},{"key":"e_1_3_2_1_26_1","volume-title":"SEPTEMBER","author":"Speech Emotion Recognition Unsupervised Domain","year":"2014","unstructured":"Autoencoder-based Unsupervised Domain Adaptation for Speech Emotion Recognition . Jun Deng , Student Member , IEEE , Zixing Zhang , Florian Eyben , Member, IEEE , and Bj\u00f6rn Schuller , Member, IEEE. s.l. : IEEE SIGNAL PROCESSING LETTERS, VOL. 21, NO. 9 , SEPTEMBER 2014 . Autoencoder-based Unsupervised Domain Adaptation for Speech Emotion Recognition. Jun Deng, Student Member, IEEE, Zixing Zhang, Florian Eyben, Member, IEEE, and Bj\u00f6rn Schuller, Member, IEEE. s.l.: IEEE SIGNAL PROCESSING LETTERS, VOL. 21, NO. 9, SEPTEMBER 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","acronym":"BDIOT2017","location":"London United Kingdom"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":26,"alternative-id":["10.1145\/3175684.3175690","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175690","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}