{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:48:13Z","timestamp":1767707293266,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T00:00:00Z","timestamp":1676592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,17]]},"DOI":"10.1145\/3587716.3587790","type":"proceedings-article","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T23:27:30Z","timestamp":1694129250000},"page":"444-450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Feature Selections for Phishing URLs Detection Using Combination of Multiple Feature Selection Methods"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7271-5845","authenticated-orcid":false,"given":"Abulfaz","family":"Hajizada","sequence":"first","affiliation":[{"name":"Dove Science Academy - Tulsa HS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-4591","authenticated-orcid":false,"given":"Sharmin","family":"Jahan","sequence":"additional","affiliation":[{"name":"Computer Science, Oklahoma State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Ram Basnet Andrew H. Sung and Qingzhong Liu. 2012. Feature selection for improved phishing detection.\u00a0Advanced Research in Applied Artificial Intelligence 252\u2013261. https:\/\/doi.org\/10.1007\/978-3-642-31087-4_27\u00a0","DOI":"10.1007\/978-3-642-31087-4_27"},{"key":"e_1_3_2_1_2_1","first-page":"v1","article-title":"Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Cardiff Metropolitan University","volume":"16988479","author":"Alkhalil Zainab","year":"2021","unstructured":"Zainab Alkhalil, Chaminda Hewage, Liqaa Nawaf, and Imtiaz Khan. 2021. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Cardiff Metropolitan University. Journal contribution. https:\/\/hdl.handle.net\/10779\/cardiffmet.16988479.v1","journal-title":"Journal contribution. https:\/\/hdl.handle.net\/10779\/cardiffmet."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Mohammad Almseidin Almaha Abuzuraiq Mouhammd Alkasassbeh and Nidal Alnidami. 2019. Phishing detection based on machine learning and feature selection methods.\u00a0International Journal of Interactive Mobile Technologies (IJIM) \u00a013(12). https:\/\/doi.org\/10.3991\/ijim.v13i12.11411\u00a0","DOI":"10.3991\/ijim.v13i12.11411"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/cict.2015.63"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Jie Cai Jiawei Luo Shulin Wang and Sheng Yang. 2018. Feature selection in Machine Learning: A new perspective.\u00a0Neurocomputing \u00a0300 70\u201379. https:\/\/doi.org\/10.1016\/j.neucom.2017.11.077\u00a0","DOI":"10.1016\/j.neucom.2017.11.077"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Girish Chandrashekar and Ferat Sahin. 2014. A survey on feature selection methods.\u00a0Computers & Electrical Engineering \u00a040(1) 16\u201328. https:\/\/doi.org\/10.1016\/j.compeleceng.2013.11.024\u00a0","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Nazreen Banu and S. Munawara Banu. 2013. A Comprehensive Study of Phishing Attacks. International Journal of Computer Science and Information Technologies 783\u2013786.\u00a0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Bimal Parmar. 2012. Protecting against Spear-Phishing.\u00a0Computer Fraud & Security. 8\u201311. https:\/\/doi.org\/10.1016\/s1361-3723(12)70007-6","DOI":"10.1016\/s1361-3723(12)70007-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Altyeb Altaher. 2017. Phishing websites classification using hybrid SVM and KNN approach. International Journal of Advanced Computer Science and Applications 8(6).","DOI":"10.14569\/IJACSA.2017.080611"},{"key":"e_1_3_2_1_10_1","unstructured":"Xiaoqing GU Hongyuan WANG and Tongguang NI. 2013. An efficient approach to detecting phishing web.\u00a0Journal of Computational Information Systems \u00a09(14) 5553\u20135560.\u00a0"},{"volume-title":"Proceedings of the 16th international conference on World Wide Web.","author":"Zhang Yue","key":"e_1_3_2_1_11_1","unstructured":"Yue Zhang, Hong I. Jason, and Cranor F. Lorrie. 2007. Cantina: a content-based approach to detecting phishing web sites. Proceedings of the 16th international conference on World Wide Web."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Yvan Saeys Thomas Abeel and Yves Van de Peer. 2008. Robust feature selection using ensemble feature selection techniques.\u00a0Machine Learning and Knowledge Discovery in Databases 313\u2013325. https:\/\/doi.org\/10.1007\/978-3-540-87481-2_21\u00a0","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"e_1_3_2_1_15_1","unstructured":"Pishing Detection Using Machine Learning. Available at: https:\/\/www.kaggle.com\/code\/fadilparves\/pishing-detection-using-machine-learning\/notebook"},{"key":"e_1_3_2_1_16_1","unstructured":"Classification of Malwares (CLaMP). Available at: https:\/\/www.kaggle.com\/datasets\/saurabhshahane\/classification-of-malwares"}],"event":{"name":"ICMLC 2023: 2023 15th International Conference on Machine Learning and Computing","acronym":"ICMLC 2023","location":"Zhuhai China"},"container-title":["Proceedings of the 2023 15th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587716.3587790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587716.3587790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:00Z","timestamp":1750183680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587716.3587790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,17]]},"references-count":16,"alternative-id":["10.1145\/3587716.3587790","10.1145\/3587716"],"URL":"https:\/\/doi.org\/10.1145\/3587716.3587790","relation":{},"subject":[],"published":{"date-parts":[[2023,2,17]]},"assertion":[{"value":"2023-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}