{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:03:44Z","timestamp":1726056224464},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324742"},{"type":"electronic","value":"9783030324759"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32475-9_28","type":"book-chapter","created":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:02:24Z","timestamp":1572220944000},"page":"385-394","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Comparative Evaluation of Techniques for Detection of Phishing URLs"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8406-9467","authenticated-orcid":false,"given":"Oluwafemi","family":"Osho","sequence":"first","affiliation":[]},{"given":"Ayanfeoluwa","family":"Oluyomi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3556-9331","authenticated-orcid":false,"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Ravin","family":"Ahuja","sequence":"additional","affiliation":[]},{"given":"Robertas","family":"Damasevicius","sequence":"additional","affiliation":[]},{"given":"Rytis","family":"Maskeliunas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231\u2013242 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"R Mohammad","year":"2014","unstructured":"Mohammad, R., Thabtah, F., Mccluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2), 443\u2013458 (2014)","journal-title":"Neural Comput. Appl."},{"key":"28_CR3","unstructured":"Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey. 1\u201321 http:\/\/arxiv.org\/abs\/1701.07179 (2017)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: IEEE International Congress on Big Data Phishing, pp. 635\u2013638 (2015)","DOI":"10.1109\/BigDataCongress.2015.97"},{"issue":"4","key":"28_CR5","doi-asserted-by":"crossref","first-page":"103","DOI":"10.13189\/wjcat.2013.010401","volume":"1","author":"O Oluwafemi","year":"2013","unstructured":"Oluwafemi, O., Adesuyi, F.A., Abdulhamid, S.M.: Combating terrorism with cybersecurity: the nigerian perspective. World J. Comput. Appl. Technol. 1(4), 103\u2013109 (2013)","journal-title":"World J. Comput. Appl. Technol."},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on Recurring malcode - WORM 2007, pp. 1\u20138 (2007)","DOI":"10.1145\/1314389.1314391"},{"issue":"7","key":"28_CR7","doi-asserted-by":"publisher","first-page":"921","DOI":"10.3923\/itj.2012.921.925","volume":"11","author":"H Huang","year":"2012","unstructured":"Huang, H., Qian, L., Wang, Y.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(7), 921\u2013925 (2012)","journal-title":"Inf. Technol. J."},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 60\u201369 (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, D., Lee, C.-H.: Heuristic-based approach for phishing site detection using URL features. In: 3rd International Conference on Advances in Computing, Electronics and Electrical Technology - CEET 2015, pp. 131\u2013135","DOI":"10.15224\/978-1-63248-056-9-84"},{"issue":"10","key":"28_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-31087-4_27","volume-title":"Advanced Research in Applied Artificial Intelligence","author":"Ram B Basnet","year":"2012","unstructured":"Basnet, Ram B., Sung, Andrew H., Liu, Q.: Feature selection for improved phishing detection. In: Jiang, H., Ding, W., Ali, M., Wu, X. (eds.) IEA\/AIE 2012. LNCS (LNAI), vol. 7345, pp. 252\u2013261. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31087-4_27"},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"AY Fu","year":"2006","unstructured":"Fu, A.Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover\u2019s distance (EMD). IEEE Trans. Dependable Secure Comput. 3(4), 301\u2013311 (2006)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Lexical URL analysis for discriminating phishing and legitimate websites. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 109\u2013115 (2011)","DOI":"10.1145\/2030376.2030389"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: Proceedings - International Conference on Distributed Computing Systems 2016, vol. 2016\u2013August, no. Sect. V, pp. 323\u2013333 (2016)","DOI":"10.1109\/ICDCS.2016.10"},{"issue":"4","key":"28_CR15","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR16","unstructured":"Bergholz, A., Paa\u00df, G., Reichartz, F., Strobel, S., Birlinghoven, S.: Improved phishing detection using model-based features. In: Fifth Conference on Email and Anti-spam, CEAS (2008)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Khonji, M., Jones, A., Iraqi, Y.: A novel Phishing classification based on URL features. In: IEEE GCC Conference and Exhibition (GCC), pp. 221\u2013224 (2011)","DOI":"10.1109\/IEEEGCC.2011.5752505"},{"issue":"3","key":"28_CR18","first-page":"30","volume":"2","author":"J Ma","year":"2011","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Learning to detect malicious URLs. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 30 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-642-02490-0_66","volume-title":"Advances in Neuro-Information Processing","author":"Daisuke Miyamoto","year":"2009","unstructured":"Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539\u2013540 (2009)"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, Y.: A real-time automatic detection of phishing URLs. In: 2nd International Conference on Computer Science and Network Technology (ICCSNT), pp. 1212\u20131216 (2012)","DOI":"10.1109\/ICCSNT.2012.6526142"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-642-02490-0_66","volume-title":"Advances in Neuro-Information Processing","author":"Daisuke Miyamoto","year":"2009","unstructured":"Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: An evaluation of machine learning-based methods for detection of phishing sites. In: International Conference on Neural Information Processing, pp. 539\u2013546 (2008)"},{"key":"28_CR22","doi-asserted-by":"publisher","first-page":"15650","DOI":"10.1109\/ACCESS.2017.2666785","volume":"5","author":"SM Abdulhamid","year":"2017","unstructured":"Abdulhamid, S.M., et al.: A review on mobile SMS spam filtering techniques. IEEE Access 5, 15650\u201315666 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"28_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63\u201392 (2008)","journal-title":"Artif. Intell. Rev."},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Panigrahi, P.: A comparative study of supervised machine learning techniques for spam E-mail filtering. In: Proceedings - 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012, pp. 506\u2013512 (2012)","DOI":"10.1109\/CICN.2012.14"},{"key":"28_CR25","doi-asserted-by":"publisher","first-page":"60","DOI":"10.5815\/ijcnis.2018.01.07","volume":"1","author":"SM Abdulhamid","year":"2018","unstructured":"Abdulhamid, S.M., Shuaib, M., Osho, O.: Comparative analysis of classification algorithms for email spam detection. Int. J. Comput. Network Inf. Security 1, 60\u201367 (2018)","journal-title":"Int. J. Comput. Network Inf. Security"},{"key":"28_CR26","first-page":"11","volume":"01","author":"M Iqbal","year":"2016","unstructured":"Iqbal, M., Abid, M.M., Ahmad, M., Khurshid, F.: Study on the effectiveness of spam detection technologies. Int. J. Inf. Technol. Comput. Sci. 01, 11\u201321 (2016)","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Associative classification techniques for predicting e-banking phishing websites. In: International Conference on Multimedia Computing and Information Technology (MCIT), pp. 9\u201312 (2010)","DOI":"10.1109\/MCIT.2010.5444840"},{"issue":"12","key":"28_CR28","doi-asserted-by":"publisher","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","volume":"37","author":"M Aburrous","year":"2010","unstructured":"Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Intelligent detection system for e-banking phishing websites using fuzzy data mining. Expert Syst. Appl. 37(12), 7913\u20137921 (2010)","journal-title":"Expert Syst. Appl."},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Aburrous, M., Hossain, M.A., Dahal, K., Thabtah, F.: Predicting phishing websites using classification mining techniques with experimental case studies. In: Seventh International Conference on Information Technology: New Generations (ITNG), pp. 176\u2013181 (2010)","DOI":"10.1109\/ITNG.2010.117"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254 (2009)","DOI":"10.1145\/1557019.1557153"},{"issue":"6","key":"28_CR31","doi-asserted-by":"publisher","first-page":"11","DOI":"10.15623\/ijret.2014.0306003","volume":"3","author":"RB Basnet","year":"2014","unstructured":"Basnet, R.B., Sung, A.H., Liu, Q.: Learning to detect phishing URLs. IJRET: Int. J. Res. Eng. Technol. 3(6), 11\u201324 (2014)","journal-title":"IJRET: Int. J. Res. Eng. Technol."},{"issue":"8","key":"28_CR32","doi-asserted-by":"crossref","first-page":"118","DOI":"10.29121\/granthaalayah.v4.i8.2016.2570","volume":"4","author":"R Gupta","year":"2016","unstructured":"Gupta, R.: Comparison of classification algorithms to detect phishing web pages using feature selection and extraction. Int. J. Res. Granthaalayah 4(8), 118\u2013135 (2016)","journal-title":"Int. J. Res. Granthaalayah"},{"issue":"6","key":"28_CR33","doi-asserted-by":"publisher","first-page":"302","DOI":"10.7813\/2075-4124.2012\/4-6\/A.43","volume":"4","author":"S Nawafleh","year":"2012","unstructured":"Nawafleh, S., Hadi, W.: Multi-class associative classification to predicting phishing websites. Int. J. Acad. Res. 4(6), 302\u2013306 (2012)","journal-title":"Int. J. Acad. Res."},{"issue":"9","key":"28_CR34","first-page":"72","volume":"8","author":"W Ali","year":"2017","unstructured":"Ali, W.: Phishing website detection based on supervised machine learning with wrapper features selection. Int. J. Adv. Comput. Sci. Appl. 8(9), 72\u201378 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"28_CR35","unstructured":"Oluyomi, A., Osho, O., Shuaib, M.: Evaluation of classification algorithms for phishing URL detection. In: 2nd International Conference on Information and Communication Technology and Its Applications, pp. 243\u2013249 (2018)"},{"key":"28_CR36","unstructured":"UCI Machine Learning Repository: Phishing Websites Data set (2018). https:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing+websites . Accessed 03 May 2018"},{"key":"28_CR37","unstructured":"Mohammad, R., Thabtah, F.A., McCluskey, T.L.: Phishing Websites Dataset. University of Huddersfield Repository (2018). http:\/\/eprints.hud.ac.uk\/id\/eprint\/24330\/ . Accessed 04 Oct 2018"}],"container-title":["Communications in Computer and Information Science","Applied Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32475-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T19:44:59Z","timestamp":1664739899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32475-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324742","9783030324759"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32475-9_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icai22019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icai.itiud.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}