{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:40Z","timestamp":1773655780356,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.3103\/s0146411619040102","type":"journal-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T06:04:57Z","timestamp":1568613897000},"page":"333-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms"],"prefix":"10.3103","volume":"53","author":[{"family":"Muhammad Taseer Suleman","sequence":"first","affiliation":[]},{"family":"Shahid Mahmood Awan","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"key":"7135_CR1","series-title":"On the effectiveness of techniques to detect phishing sites","volume-title":"The Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C. Ludl","year":"2007","unstructured":"Ludl, C., McAllister, S., Kirda, E., and Kruegel, C., On the effectiveness of techniques to detect phishing sites, in The Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2007, pp. 20\u201339."},{"key":"7135_CR2","unstructured":"AWPG. APWG Phishing Activity Trends Report. https:\/\/www.antiphishing.org\/resources\/apwg-reports\/. Accessed 2nd Quarter 2018."},{"key":"7135_CR3","unstructured":"Basnet, R.B., Sung, A.H., and Liu, Q., Rule-based phishing attack detection, Proceedings of the International Conference on Security and Management-SAM'11, Las Vegas, NV, 2011."},{"key":"7135_CR4","unstructured":"Abdul Ghani, A. and Nurul, A., Real-time detection of phishing websites, IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2016."},{"key":"7135_CR5","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2017.02.004","volume":"71","author":"M. Volkamer","year":"2017","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B., and Kunz, A., User experiences of torpedo: Tooltip-powered phishing email detection, Comput. Secur., 2017, vol. 71, pp. 100\u2013113.","journal-title":"Comput. Secur."},{"key":"7135_CR6","doi-asserted-by":"crossref","unstructured":"Cao, Y., Han, W., and Le, Y., Anti-phishing based on automated individual white-list, Proceedings of the 4th ACM Workshop on Digital Identity, 2008.","DOI":"10.1145\/1456424.1456434"},{"key":"7135_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"K.L. Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., and Tan, C.L., A survey of phishing attacks: Their types, vectors, and technical approaches, Expert Syst. Appl., 2018, vol. 106, pp. 1\u201320.","journal-title":"Expert Syst. Appl."},{"key":"7135_CR8","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A., and Faloutsos, M., Phishdef: URL names say it all, 2011\n                           Proceedings IEEE INFOCOM, 2011, pp. 191\u2013195.","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"7135_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.cose.2013.10.004","volume":"40","author":"R. Gowtham","year":"2014","unstructured":"Gowtham, R. and Krishnamurthi, I., A comprehensive and efficacious architecture for detecting phishing web pages, Comput. Secur., 2014, vol. 40, pp. 23\u201337.","journal-title":"Comput. Secur."},{"key":"7135_CR10","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1093\/comjnl\/bxx035","volume":"60","author":"E.S.M. El-Alfy","year":"2017","unstructured":"El-Alfy, E.S.M., Detection of phishing websites based on probabilistic neural networks and K-medoids clustering, Comput. J., 2017, vol. 60, no. 12, pp. 1745\u20131759.","journal-title":"Comput. J."},{"key":"7135_CR11","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s11280-016-0418-9","volume":"20","author":"W. Zhang","year":"2017","unstructured":"Zhang, W., Jiang, Q., Chen, L., and Li, C., Two-stage ELM for phishing Web pages detection using hybrid features, World Wide Web, 2017, vol. 20, no. 4, pp. 797\u2013813.","journal-title":"World Wide Web"},{"key":"7135_CR12","unstructured":"Google safe browsing API. https:\/\/developers.google.com\/safe-browsing\/. Accessed June 1, 2018."},{"key":"7135_CR13","doi-asserted-by":"crossref","unstructured":"Jeeva, S.C. and Rajsingh, E.B., Intelligent phishing URL detection using association rule mining, Hum.-Centric Comput. Inf. Sci., 2017, vol. 6, no. 10.","DOI":"10.1186\/s13673-016-0064-3"},{"key":"7135_CR14","doi-asserted-by":"crossref","unstructured":"Buber, E., Diri, B., and Sahingoz, O.K., Detecting phishing attacks from URL by using NLP techniques, 2017 International Conference on Computer Science and Engineering (UBMK), 2017, pp. 337\u2013342.","DOI":"10.1109\/UBMK.2017.8093406"},{"key":"7135_CR15","doi-asserted-by":"crossref","unstructured":"Ramesh, G., Krishnamurthi, I., and Kumar, K. An efficacious method for detecting phishing web pages through target domain identification, Decis. Support Syst., 2014, pp. 12\u201322.","DOI":"10.1016\/j.dss.2014.01.002"},{"key":"7135_CR16","doi-asserted-by":"publisher","unstructured":"James, J., Sandhya, L., and Thomas, C., Detection of phishing URLs using machine learning techniques, 2013 International Conference on Control Communication and Computing (ICCC), Thiruvananthapuram, 2013, pp. 304\u2013309. https:\/\/doi.org\/10.1109\/ICCC.2013.6731669","DOI":"10.1109\/ICCC.2013.6731669"},{"key":"7135_CR17","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","volume":"10","author":"A.K. Jain","year":"2019","unstructured":"Jain, A.K. and Gupta, B.B., A machine learning based approach for phishing detection using hyperlinks information, J. Ambient Intell. Hum. Comput., 2019, vol. 10, no. 5, pp. 2015\u20132028.","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"7135_CR18","unstructured":"Rami, M.M., Fadi, T., and Lee, M., An assessment of features related to phishing websites using an automated technique, IEEE International Conference For Internet Technology And Secured Transactions. ICITST 2012, London, 2012, pp. 492\u2013497."},{"key":"7135_CR19","unstructured":"Phishing Dataset. https:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing+websites. Accessed April 25, 2018."},{"key":"7135_CR20","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"G.E. Goldberg","year":"1989","unstructured":"Goldberg, G.E., Genetic Algorithms in Search, Optimization and Machine Learning, New York: Addison-Wesley, 1989."},{"key":"7135_CR21","volume-title":"Genetic Algorithms+Data Structures=Evolution Programs","author":"Z. Michalewicz","year":"1999","unstructured":"Michalewicz, Z. Genetic Algorithms+Data Structures=Evolution Programs, New York: Springer, 1999, 3rd ed."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619040102.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619040102","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619040102.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:35Z","timestamp":1773612035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619040102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7135"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619040102","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"1 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}