{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:43:30Z","timestamp":1768013010751,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,25]]},"DOI":"10.1145\/3227609.3227655","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Swarm Intelligence Approaches for Parameter Setting of Deep Learning Neural Network"],"prefix":"10.1145","author":[{"given":"Grega","family":"Vrban\u010di\u010d","sequence":"first","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]},{"suffix":"Jr.","given":"Iztok","family":"Fister","sequence":"additional","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]},{"given":"Vili","family":"Podgorelec","sequence":"additional","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]}],"member":"320","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Greg Aaron and Ronnie Manning. {n. d.}. APWG Phishing Reports. APWG. 2014.  Greg Aaron and Ronnie Manning. {n. d.}. APWG Phishing Reports. APWG. 2014."},{"key":"e_1_3_2_1_2_1","unstructured":"Greg Aaron and Rod Rasmussen. 2017. Global Phishing Survey 2015-2016 Global Phishing Survey: Trends and Domain Name Use in 2016 An APWG Industry Advisory Global Phishing Survey 2016: Trends and Domain Name Use. Global Phishing Survey (2017). https:\/\/docs.apwg.org\/reports\/APWG{_}Global{_}Phishing{_}Report{_}2015-2016.pdf  Greg Aaron and Rod Rasmussen. 2017. Global Phishing Survey 2015-2016 Global Phishing Survey: Trends and Domain Name Use in 2016 An APWG Industry Advisory Global Phishing Survey 2016: Trends and Domain Name Use. Global Phishing Survey (2017). https:\/\/docs.apwg.org\/reports\/APWG{_}Global{_}Phishing{_}Report{_}2015-2016.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Neda Abdelhamid Aladdin Ayesh and Fadi Thabtah. 2014. Phishing detection based Associative Classification data mining. 5948--5959 pages.  Neda Abdelhamid Aladdin Ayesh and Fadi Thabtah. 2014. Phishing detection based Associative Classification data mining. 5948--5959 pages.","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"e_1_3_2_1_4_1","first-page":"72","article-title":"Phishing Website Detection based on Supervised Machine Learning with Wrapper Features Selection","volume":"8","author":"Ali Waleed","year":"2017","journal-title":"IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Security and Management (SAM","author":"Basnet Ram B","year":"2011"},{"key":"e_1_3_2_1_6_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"A hybrid bat algorithm","volume":"80","author":"Fister Iztok","year":"2013","journal-title":"Elektrotehni\u0161ki Vestnik\/Electrotechnical Review"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2537-8"},{"key":"e_1_3_2_1_12_1","volume-title":"AISTATS '11: Proceedings of the 14th International Conference on Artificial Intelligence and Statistics 15","author":"Glorot Xavier","year":"2011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.004"},{"key":"e_1_3_2_1_14_1","volume-title":"Adam: A Method for Stochastic Optimization. ICLR","author":"Kingma Diederik P","year":"2015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.185"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Yann Lecun Yoshua Bengio and Geoffrey Hinton. 2015. Deep learning. 436--444 pages. arXiv:arXiv:1312.6184v5  Yann Lecun Yoshua Bengio and Geoffrey Hinton. 2015. Deep learning. 436--444 pages. arXiv:arXiv:1312.6184v5","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_17_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository. Available at http:\/\/archive.ics.uci.edu\/ml Accessed: 2018-01-15.  M. Lichman. 2013. UCI Machine Learning Repository. Available at http:\/\/archive.ics.uci.edu\/ml Accessed: 2018-01-15."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"e_1_3_2_1_19_1","volume-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"Miyamoto Daisuke"},{"key":"e_1_3_2_1_20_1","unstructured":"Rami M Mohammad Fadi Thabtah and Lee McCluskey. {n. d.}. Phishing Websites at UCI Machine Learning Repository. Available at http:\/\/archive.ics.uci.edu\/ml\/datasets\/Phishing+Websites Accessed: 2018-01-17.  Rami M Mohammad Fadi Thabtah and Lee McCluskey. {n. d.}. Phishing Websites at UCI Machine Learning Repository. Available at http:\/\/archive.ics.uci.edu\/ml\/datasets\/Phishing+Websites Accessed: 2018-01-17."},{"key":"e_1_3_2_1_21_1","volume-title":"Internet Technology And Secured Transactions, 2012 International Conference for. IEEE, 492--497","author":"Mohammad Rami M","year":"2012"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1490-z"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.04.001"},{"key":"e_1_3_2_1_24_1","unstructured":"Travis E Oliphant. 2006. A guide to NumPy. Vol. 1. Trelgol Publishing USA.   Travis E Oliphant. 2006. A guide to NumPy. Vol. 1. Trelgol Publishing USA."},{"key":"e_1_3_2_1_25_1","unstructured":"OpenDNS. {n. d.}. PhishTank data archives. Available at https:\/\/www.phishtank.com\/ Accessed: 2018-01-17.  OpenDNS. {n. d.}. PhishTank data archives. Available at https:\/\/www.phishtank.com\/ Accessed: 2018-01-17."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_27_1","unstructured":"Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs File Paths and Registry Keys. CoRR abs\/1702.08568 (2017). arXiv:1702.08568 http:\/\/arxiv.org\/abs\/1702.08568  Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs File Paths and Registry Keys. CoRR abs\/1702.08568 (2017). arXiv:1702.08568 http:\/\/arxiv.org\/abs\/1702.08568"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0214"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013.","author":"Thabtah Abdeljaber Fadi","year":"2013"},{"key":"e_1_3_2_1_31_1","volume-title":"2016 International Joint Conference on Neural Networks (IJCNN). 4221--4226","author":"Thabtah F."},{"key":"e_1_3_2_1_32_1","unstructured":"Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning 4 2 (2012) 26--31.  Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning 4 2 (2012) 26--31."},{"key":"e_1_3_2_1_33_1","volume-title":"Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.","author":"Witten Ian H","year":"2016"},{"key":"e_1_3_2_1_34_1","first-page":"65","article-title":"A new metaheuristic Bat-inspired Algorithm","volume":"284","author":"Yang Xin She","year":"2010","journal-title":"Studies in Computational Intelligence"}],"event":{"name":"WIMS '18: 8th International Conference on Web Intelligence, Mining and Semantics","location":"Novi Sad Serbia","acronym":"WIMS '18"},"container-title":["Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3227609.3227655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:27Z","timestamp":1750212447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227655"}},"subtitle":["Case Study on Phishing Websites Classification"],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":33,"alternative-id":["10.1145\/3227609.3227655","10.1145\/3227609"],"URL":"https:\/\/doi.org\/10.1145\/3227609.3227655","relation":{},"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}