{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:44:37Z","timestamp":1778604277825,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T00:00:00Z","timestamp":1646870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,10]]},"DOI":"10.1145\/3542954.3542967","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T23:13:51Z","timestamp":1660259631000},"page":"83-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Phishing Website Detection using Deep Learning"],"prefix":"10.1145","author":[{"given":"Md. Abu Ashraf","family":"Siddiq","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad","family":"Arifuzzaman","sequence":"additional","affiliation":[{"name":"East West University, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. S.","family":"Islam","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet Security Threat Report","year":"2019","unstructured":"\u201c Internet Security Threat Report , Volume 24 .\u201d Symantec . 2019 . https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en \u201cInternet Security Threat Report, Volume 24.\u201d Symantec. 2019. https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en"},{"key":"e_1_3_2_1_2_1","volume-title":"proceedings of IEEE International Conference for Innovation in Technology (INOCON) Bengaluru, India.","author":"B.","year":"2020","unstructured":"Yazhmozhi. V.M, B. Janet and Srinivasulu Reddy, 2020. Anti-phishing System using LSTM and CNN . In proceedings of IEEE International Conference for Innovation in Technology (INOCON) Bengaluru, India. Nov 6-8, 2020 . Yazhmozhi. V.M, B. Janet and Srinivasulu Reddy, 2020. Anti-phishing System using LSTM and CNN. In proceedings of IEEE International Conference for Innovation in Technology (INOCON) Bengaluru, India. Nov 6-8, 2020."},{"key":"e_1_3_2_1_3_1","first-page":"1183","volume-title":"Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV","author":"Dr M. D","year":"2021","unstructured":"Bhagwat M. D , Dr . Patil P. H and Dr . T. S. Vishawanath , 2021 . A Methodical Overview on Detection, Identification and Proactive Prevention of Phishing Websites . In Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). IEEE Xplore Part Number : CFP21ONG-ART; 978-0-7381- 1183 - 1184 Bhagwat M. D, Dr. Patil P. H and Dr. T. S. Vishawanath, 2021. A Methodical Overview on Detection, Identification and Proactive Prevention of Phishing Websites. In Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4"},{"key":"e_1_3_2_1_4_1","volume-title":"Fahmida Islam and Mohammad Arifuzzaman","year":"2021","unstructured":"Sadia Parvin Ripa , Fahmida Islam and Mohammad Arifuzzaman , 2021 . The Emergence Threat of Phishing Attack and The Detection Techniques Using Machine Learning Models. In proceedings of 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI), 8-9 July 2021, Rajshahi, Bangladesh . Sadia Parvin Ripa, Fahmida Islam and Mohammad Arifuzzaman, 2021. The Emergence Threat of Phishing Attack and The Detection Techniques Using Machine Learning Models. In proceedings of 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI), 8-9 July 2021, Rajshahi, Bangladesh."},{"key":"e_1_3_2_1_5_1","volume-title":"proceedings of 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS).","year":"2020","unstructured":"Rania Zaimi, Mohamed Hafidi, Mahnane Lamia , 2020 . Survey paper: Taxonomy of website anti-phishing solutions . In proceedings of 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS). Rania Zaimi, Mohamed Hafidi, Mahnane Lamia, 2020. Survey paper: Taxonomy of website anti-phishing solutions. In proceedings of 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)."},{"key":"e_1_3_2_1_6_1","volume-title":"UCI Machine Learning Repository [http:\/\/archive.ics.uci.edu\/ml].","author":"Mohammad M.","unstructured":"Rami M. Mohammad , Fadi Thabtah and Lee McCluskey. Phishing Websites Features . In UCI Machine Learning Repository [http:\/\/archive.ics.uci.edu\/ml]. Irvine, CA : University of California , School of Information and Computer Science. Rami M. Mohammad, Fadi Thabtah and Lee McCluskey. Phishing Websites Features. In UCI Machine Learning Repository [http:\/\/archive.ics.uci.edu\/ml]. Irvine, CA: University of California, School of Information and Computer Science."},{"key":"e_1_3_2_1_7_1","volume-title":"Deep Learning with Python","year":"2017","unstructured":"Francois Chollet. 2017. Deep Learning with Python , Manning Publications , 2017 . Francois Chollet. 2017. Deep Learning with Python, Manning Publications,2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Deep Learning with Convolutional Neural Network and Long Short-Term Memory for Phishing Detection. In proceedings of 13th International Conference on Software, Knowledge","volume":"2019","author":"Adebowale M. A.","year":"2019","unstructured":"M. A. Adebowale , K. T. Lwin and M. A. Hossain , 2019 . Deep Learning with Convolutional Neural Network and Long Short-Term Memory for Phishing Detection. In proceedings of 13th International Conference on Software, Knowledge , Information Management and Applications (SKIMA) , 2019 , pp. 1 - 8 , DOI: 10.1109\/SKIMA47702.2019.8982427. 10.1109\/SKIMA47702.2019.8982427 M. A. Adebowale, K. T. Lwin and M. A. Hossain, 2019. Deep Learning with Convolutional Neural Network and Long Short-Term Memory for Phishing Detection. In proceedings of 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), 2019, pp. 1-8, DOI: 10.1109\/SKIMA47702.2019.8982427.","journal-title":"Information Management and Applications (SKIMA)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991403"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920655"}],"event":{"name":"ICCA 2022: 2nd International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2022"},"container-title":["Proceedings of the 2nd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542954.3542967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3542954.3542967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:32Z","timestamp":1750182572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542954.3542967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,10]]},"references-count":11,"alternative-id":["10.1145\/3542954.3542967","10.1145\/3542954"],"URL":"https:\/\/doi.org\/10.1145\/3542954.3542967","relation":{},"subject":[],"published":{"date-parts":[[2022,3,10]]},"assertion":[{"value":"2022-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}