{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T09:17:09Z","timestamp":1774862229118,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE 1433817"],"award-info":[{"award-number":["DGE 1433817"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1319212"],"award-info":[{"award-number":["CNS 1319212"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE 1356705"],"award-info":[{"award-number":["DUE 1356705"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3375708.3380313","type":"proceedings-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T20:19:43Z","timestamp":1584044383000},"page":"35-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Diverse Datasets and a Customizable Benchmarking Framework for Phishing"],"prefix":"10.1145","author":[{"given":"Victor","family":"Zeng","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Shahryar","family":"Baki","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Ayman El","family":"Aassal","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Rakesh","family":"Verma","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Luis Felipe Teixeira","family":"De Moraes","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Avisha","family":"Das","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of IWSPA-AP: Anti-Phishing Shared Task Pilot at the 4th ACM IWSPA. 2--10","author":"Aassal Ayman El","year":"2018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/425731"},{"key":"e_1_3_2_1_4_1","unstructured":"Alexa. 2019. Alexa Top Sites. https:\/\/aws.amazon.com\/alexa-top-sites\/  Alexa. 2019. Alexa Top Sites. https:\/\/aws.amazon.com\/alexa-top-sites\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Adithya Balaji and Alexander Allen. 2018. Benchmarking Automatic Machine Learning Frameworks. (2018).  Adithya Balaji and Alexander Allen. 2018. Benchmarking Automatic Machine Learning Frameworks. (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541883"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734234.1734239"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A. Das S. Baki A. El Aassal R. Verma and A. Dunbar. 2019. SoK: A Comprehensive Reexamination of Phishing Research from the Security Perspective. IEEE Communications Surveys Tutorials (2019) 1--1. https:\/\/doi.org\/10.1109\/COMST.2019.2957750  A. Das S. Baki A. El Aassal R. Verma and A. Dunbar. 2019. SoK: A Comprehensive Reexamination of Phishing Research from the Security Perspective. IEEE Communications Surveys Tutorials (2019) 1--1. https:\/\/doi.org\/10.1109\/COMST.2019.2957750","DOI":"10.1109\/COMST.2019.2957750"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745439"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969780"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 28th International Conference on Neural Information Processing Systems -","volume":"2","author":"Feurer Matthias","year":"2015"},{"key":"e_1_3_2_1_13_1","volume-title":"Bernd Bischl, and Joaquin Vanschoren.","author":"Gijsbers P. J. A.","year":"2019"},{"key":"e_1_3_2_1_14_1","volume-title":"Phishing Email Feature Selection Approach. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications . IEEE","author":"Hamid I. R. A.","year":"2011"},{"key":"e_1_3_2_1_15_1","volume-title":"Profiling Phishing Email Based on Clustering Approach. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications . IEEE","author":"Hamid I. R. A.","year":"2013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851801"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053017"},{"key":"e_1_3_2_1_18_1","volume-title":"2011 International Conference for Internet Technology and Secured Transactions . IEEE, Abu Dhabi, United Arab Emirates, 422--427","author":"Khonji M."},{"key":"e_1_3_2_1_19_1","unstructured":"Hung Le Quang Pham Doyen Sahoo and Steven CH Hoi. 2018. URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. (2018).  Hung Le Quang Pham Doyen Sahoo and Steven CH Hoi. 2018. URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. (2018)."},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Imbalanced-learn: A Python Toolbox to Tackle the Curse of Imbalanced Datasets in Machine Learning","volume":"18","author":"Guillaume Lema\u00ee","year":"2017","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Wei Liu Sanjay Chawla David A Cieslak and Nitesh V Chawla. 2010. A robust decision tree algorithm for imbalanced data sets. bibinfonumpages766--777 pages.  Wei Liu Sanjay Chawla David A Cieslak and Nitesh V Chawla. 2010. A robust decision tree algorithm for imbalanced data sets. bibinfonumpages766--777 pages.","DOI":"10.1137\/1.9781611972801.67"},{"key":"e_1_3_2_1_22_1","unstructured":"Jose Nazario. 2004. The online phishing corpus. https:\/\/monkey.org\/ jose\/phishing\/  Jose Nazario. 2004. The online phishing corpus. https:\/\/monkey.org\/ jose\/phishing\/"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference 2016 (GECCO '16)","author":"Olson Randal S."},{"key":"e_1_3_2_1_24_1","unstructured":"OpenDNS-PhishTank. 2012. The PhishTank Database. http:\/\/www.phishtank.com\/developer_info.php .  OpenDNS-PhishTank. 2012. The PhishTank Database. http:\/\/www.phishtank.com\/developer_info.php ."},{"key":"e_1_3_2_1_25_1","unstructured":"OpenPhish. 2019. OpenPhish. https:\/\/openphish.com\/index.html  OpenPhish. 2019. OpenPhish. https:\/\/openphish.com\/index.html"},{"key":"e_1_3_2_1_26_1","unstructured":"Mustafa A Mohammad Rami McCluskey Lee and Thabtah Fadi. 2015. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing  Mustafa A Mohammad Rami McCluskey Lee and Thabtah Fadi. 2015. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing"},{"key":"e_1_3_2_1_27_1","unstructured":"websites  websites"},{"key":"e_1_3_2_1_28_1","volume-title":"McGill","author":"Salton Gerard","year":"1986"},{"key":"e_1_3_2_1_29_1","unstructured":"Choon Lin Tan. 2018. Phishing Dataset for Machine Learning: Feature Evaluation. http:\/\/dx.doi.org\/10.17632\/h3cgnj8hft.1#file-286768bb-83f2--4e59--9210--6fed84e3c7fd  Choon Lin Tan. 2018. Phishing Dataset for Machine Learning: Feature Evaluation. http:\/\/dx.doi.org\/10.17632\/h3cgnj8hft.1#file-286768bb-83f2--4e59--9210--6fed84e3c7fd"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 1st Anti-phishing Shared Pilot at 4th ACM IWSPA (IWSPA-AP). CEUR. http:\/\/ceur-ws.org\/Vol-2124\/.","author":"Verma Rakesh","year":"2018"},{"key":"e_1_3_2_1_31_1","volume-title":"2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)","volume":"04","author":"Verma R."},{"key":"e_1_3_2_1_32_1","volume-title":"Computer Security -- ESORICS 2012 ,","author":"Verma Rakesh"},{"key":"e_1_3_2_1_33_1","volume-title":"Verma and Nabil Hossain","author":"Rakesh","year":"2014"},{"key":"e_1_3_2_1_34_1","volume-title":"Verma and David Marchette","author":"Rakesh","year":"2019"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363267"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.03.077"},{"key":"e_1_3_2_1_37_1","volume-title":"Profiling Phishing Emails Based on Hyperlink Information. In 2010 International Conference on Advances in Social Networks Analysis and Mining. IEEE","author":"Yearwood J.","year":"2010"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Sixth International Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375708.3380313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375708.3380313","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375708.3380313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:15Z","timestamp":1750199895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375708.3380313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":37,"alternative-id":["10.1145\/3375708.3380313","10.1145\/3375708"],"URL":"https:\/\/doi.org\/10.1145\/3375708.3380313","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}