{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:40:03Z","timestamp":1755862803115,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3659211.3659327","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:22:21Z","timestamp":1716999741000},"page":"673-677","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Intellivoting: Detection Method of Phishing Emails Based on Hybrid Features and Soft Voting Mechanism"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4114-1862","authenticated-orcid":false,"given":"Jingyu","family":"Tong","sequence":"first","affiliation":[{"name":"Wuhan Research Institute of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7318-1450","authenticated-orcid":false,"given":"Xuefang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wuhan Research Institute of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. Warburton \"Phishing attacks soar 220% during covid-19 peak as cybercriminal opportunism intensifies\" 03 2022 [online] Available: https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/2022-phishing-and-fraud-report."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2017.8252096"},{"key":"e_1_3_2_1_3_1","first-page":"2014","article-title":"Classification of phishing email using random forest machine learning technique [J]","author":"Akinyelu A A","year":"2014","unstructured":"Akinyelu A A, Adewumi A O. Classification of phishing email using random forest machine learning technique [J]. Journal of Applied Mathematics, 2014, 2014.","journal-title":"Journal of Applied Mathematics"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102414"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"signature in e-mails forwarding [C]\/\/2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ)","volume":"2022","author":"Dubos C","unstructured":"Dubos C, Serhrouchni A. Persistent S\/MIME signature in e-mails forwarding [C]\/\/2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2022: 1-8.","journal-title":"IEEE"},{"key":"e_1_3_2_1_7_1","first-page":"451","volume-title":"Proceedings of the 9th International Conference on Machine Learning and Computing.","author":"Yadav D.P.","year":"2017","unstructured":"Yadav, D.P., Paliwal, P., Kumar, D., Tripathi, R., 2017. A novel ensemble based identification of phishing e-mails. In: Proceedings of the 9th International Conference on Machine Learning and Computing. pp. 447\u2013451."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2015.7399985"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.103"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Panagiotis Bountakas and C. Xenakis HELPHED: Hybrid Ensemble Learning PHishing Email Detection Journal of Network and Computer Applications. 2022: 210","DOI":"10.2139\/ssrn.4147334"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"F. Toolan and J. Carthy Phishing detection using classifier ensembles 2009 eCrime Researchers Summit (2009):","DOI":"10.1109\/ECRIME.2009.5342607"},{"key":"e_1_3_2_1_12_1","first-page":"1532","article-title":"Glove: Global vectors for word representation","author":"Pennington R.","year":"2014","unstructured":"J. Pennington, R. Socher and C. D. Manning, \"Glove: Global vectors for word representation\", Empirical Methods in Natural Language Processing (EMNLP), pp. 1532-1543, 2014.","journal-title":"Empirical Methods in Natural Language Processing (EMNLP)"}],"event":{"name":"BDEIM 2023: 2023 4th International Conference on Big Data Economy and Information Management","acronym":"BDEIM 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3659211.3659327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:04:56Z","timestamp":1755860696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":12,"alternative-id":["10.1145\/3659211.3659327","10.1145\/3659211"],"URL":"https:\/\/doi.org\/10.1145\/3659211.3659327","relation":{},"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}