{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:14:19Z","timestamp":1771665259953,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,15]]},"DOI":"10.1145\/3625343.3625348","type":"proceedings-article","created":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T11:09:02Z","timestamp":1699700942000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9075-2828","authenticated-orcid":false,"given":"Ayoub","family":"Alsarhan","sequence":"first","affiliation":[{"name":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6255-236X","authenticated-orcid":false,"given":"Bashar","family":"Igried","sequence":"additional","affiliation":[{"name":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2568-405X","authenticated-orcid":false,"given":"Raad Mohammad","family":"Bani Saleem","sequence":"additional","affiliation":[{"name":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0319-1968","authenticated-orcid":false,"given":"Mohammad","family":"Alauthman","sequence":"additional","affiliation":[{"name":"Department of Information Security, University of Petra, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9486-3533","authenticated-orcid":false,"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Zarqa University, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2023,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE","author":"Zuraiq A. A.","year":"2019","unstructured":"Zuraiq , A. A. and Alkasassbeh , M . Phishing detection approaches . IEEE , City , 2019 . Zuraiq, A. A. and Alkasassbeh, M. Phishing detection approaches. IEEE, City, 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297032"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6535834"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207707"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCT.2018.8473085"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104347"},{"key":"e_1_3_2_1_8_1","volume-title":"Brazil","author":"Korting T. S.","year":"2006","unstructured":"Korting , T. S. C4. 5 algorithm and multivariate decision trees. Image processing division, national institute for space research\u2013INPE Sao Jose dos Campos\u2013SP , Brazil ( 2006 ), 22. Korting, T. S. C4. 5 algorithm and multivariate decision trees. Image processing division, national institute for space research\u2013INPE Sao Jose dos Campos\u2013SP, Brazil (2006), 22."},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Computer Science and Security (IJCSS), 5, 2","author":"Rajput A.","year":"2011","unstructured":"Rajput , A. , Aharwal , R. P. , Dubey , M. , Saxena , S. and Raghuvanshi , M . J48 and JRIP rules for e-governance data . International Journal of Computer Science and Security (IJCSS), 5, 2 ( 2011 ), 201. Rajput, A., Aharwal, R. P., Dubey, M., Saxena, S. and Raghuvanshi, M. J48 and JRIP rules for e-governance data. International Journal of Computer Science and Security (IJCSS), 5, 2 (2011), 201."},{"key":"e_1_3_2_1_10_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2016","unstructured":"Witten , I. H. , Frank , E. , Hall , M. A. , Pal , C. J. and Mining , D . Practical machine learning tools and techniques . Morgan Kaufmann , City , 2016 . Witten, I. H., Frank, E., Hall, M. A., Pal, C. J. and Mining, D. Practical machine learning tools and techniques. Morgan Kaufmann, City, 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"Encyclopedia of machine learning","author":"Sammut C.","year":"2011","unstructured":"Sammut , C. and Webb , G. I . Encyclopedia of machine learning . Springer Science & Business Media , 2011 . Sammut, C. and Webb, G. I. Encyclopedia of machine learning. Springer Science & Business Media, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172741"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14080223"},{"issue":"10","key":"e_1_3_2_1_14_1","first-page":"191","article-title":"A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique","volume":"16","author":"Ayoub Alsarhan","year":"2022","unstructured":"Ayoub Alsarhan , Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat , Hasan Idhaim, Omar alkhawaldeh \u201c A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique \u201c, Int. J. Interact. Mob. Technol. 16 ( 10 ), 191 - 102 , ( 2022 ). Ayoub Alsarhan, Abdel-Rahman Al-Ghuwairi, Esra'a Alshdaifat, Hasan Idhaim, Omar alkhawaldeh \u201c A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique \u201c,Int. J. Interact. Mob. Technol. 16(10), 191-102, (2022).","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Tahmasbi M. Boostani R. Aljaidi M. and Attar H. 2022 November. Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key. In 2022 International Engineering Conference on Electrical Energy and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE.  Tahmasbi M. Boostani R. Aljaidi M. and Attar H. 2022 November. Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key. In 2022 International Engineering Conference on Electrical Energy and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE.","DOI":"10.1109\/EICEEAI56378.2022.10050448"},{"key":"e_1_3_2_1_16_1","volume-title":"November. Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures. In 2022 International Arab Conference on Information Technology (ACIT) (pp. 1-5). IEEE.","author":"Samara G.","unstructured":"Samara , G. , Eid , M.B. , Aljaidi , M. , Almatarneh , S. , Rasmi , M. , Alazaideh , R. and Al-Lahham , Y ., 2022 , November. Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures. In 2022 International Arab Conference on Information Technology (ACIT) (pp. 1-5). IEEE. Samara, G., Eid, M.B., Aljaidi, M., Almatarneh, S., Rasmi, M., Alazaideh, R. and Al-Lahham, Y., 2022, November. Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures. In 2022 International Arab Conference on Information Technology (ACIT) (pp. 1-5). IEEE."},{"key":"e_1_3_2_1_17_1","volume-title":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE","author":"Aljaidi M.","unstructured":"Aljaidi , M. , Alsarhan , A. , Samara , G. , Alazaidah , R. , Almatarneh , S. , Khalid , M. and Al-Gumaei , Y.A ., 2022, November. NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures . In 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE Aljaidi, M., Alsarhan, A., Samara, G., Alazaidah, R., Almatarneh, S., Khalid, M. and Al-Gumaei, Y.A., 2022, November. NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures. In 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE"}],"event":{"name":"AIMLR 2023: 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","location":"Bangkok Thailand","acronym":"AIMLR 2023"},"container-title":["Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625343.3625348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625343.3625348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:33Z","timestamp":1750178193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625343.3625348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,15]]},"references-count":17,"alternative-id":["10.1145\/3625343.3625348","10.1145\/3625343"],"URL":"https:\/\/doi.org\/10.1145\/3625343.3625348","relation":{},"subject":[],"published":{"date-parts":[[2023,9,15]]},"assertion":[{"value":"2023-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}