{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:12:15Z","timestamp":1742641935605},"reference-count":20,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2020,7,2]]},"DOI":"10.1080\/24751839.2020.1747001","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T13:05:30Z","timestamp":1586523930000},"page":"346-362","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":20,"title":["SEADer++: social engineering attack detection in online environments using machine learning"],"prefix":"10.1080","volume":"4","author":[{"given":"Merton","family":"Lansley","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Sussex, Brighton, UK"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8804-7601","authenticated-orcid":false,"given":"Francois","family":"Mouton","sequence":"additional","affiliation":[{"name":"Department of Applied Science, Noroff University College, Oslo, Norway"},{"name":"Department of Computer Science, University of the Western Cape, Bellville, South Africa"}]},{"given":"Stelios","family":"Kapetanakis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of the Western Cape, Bellville, South Africa"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4249-4953","authenticated-orcid":false,"given":"Nikolaos","family":"Polatidis","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering and Mathematics, University of Brighton, Brighton, UK"}]}],"member":"301","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"issue":"1","key":"CIT0001","first-page":"57","volume":"17","author":"Abed-alguni B. H.","year":"2019","journal-title":"International Journal of Artificial Intelligence"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Bezuidenhout, M. \n Mouton, F. & \n Venter, H. S. (2010). Social engineering attack detection model: Seadm. In 2010 Information Security for South Africa (pp. 1\u20138).","DOI":"10.1109\/ISSA.2010.5588500"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Bhakta, R. & \n Harris, I. G. (2015). Semantic analysis of dialogs to detect social engineering attacks. In Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015) (pp. 424\u2013427).","DOI":"10.1109\/ICOSC.2015.7050843"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.020"},{"key":"CIT0005","unstructured":"Hoeschele, M. & \n Rogers, M. (2005). Detecting social engineering. In Pollitt, M. and Shenoi, S. (Eds.), Advances in digital forensics (pp. 67\u201377). Springer US."},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Jamil, A. \n Asif, K. \n Ghulam, Z. \n Nazir, M. K. \n Mudassar Alam, S. & \n Ashraf, R. (2018). Mpmpa: A mitigation and prevention model for social engineering based phishing attacks on facebook. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 5040\u20135048).","DOI":"10.1109\/BigData.2018.8622505"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Lansley, M. \n Polatidis, N. & \n Kapetanakis, S. (2019). Seader: A social engineering attack detection method based on natural language processing and artificial neural networks. In N. T. Nguyen, R. Chbeir, E. Exposito, P. Aniort\u00e9, and B. Trawi\u0144ski (Eds.), Computational collective intelligence (pp. 686\u2013696). Springer International Publishing.","DOI":"10.1007\/978-3-030-28377-3_57"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Manning, C. D. \n Surdeanu, M. \n Bauer, J. \n Finkel, J. \n Bethard, S. J. & \n McClosky, D. (2014). The Stanford CoreNLP natural language processing toolkit. In Association for Computational Linguistics (ACL) System Demonstrations (pp. 55\u201360).","DOI":"10.3115\/v1\/P14-5010"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Mouton, F. \n Leenen, L. & \n Venter, H. S. (2015). Social engineering attack detection model: Seadmv2. In 2015 International Conference on Cyberworlds (CW) (pp. 216\u2013223).","DOI":"10.1109\/CW.2015.52"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.004"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2018.8531953"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49381-6_3"},{"key":"CIT0014","unstructured":"Nicholson, J. \n Coventry, L. & \n Briggs, P. (2017). Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) (pp. 285\u2013298). USENIX Association."},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"Peng, T. \n Harris, I. & \n Sawa, Y. (2018). Detecting phishing attacks using natural language processing and machine learning. In 2018 IEEE 12th International Conference on Semantic Computing (ICSC) (pp 300\u2013301).","DOI":"10.1109\/ICSC.2018.00056"},{"key":"CIT0016","unstructured":"Precup, R.E. & \n David, R. C. (2019). Nature-inspired optimization algorithms for fuzzy controlled servo systems. Butterworth-Heinemann."},{"issue":"3","key":"CIT0017","first-page":"305","volume":"23","author":"Resnik A. J.","year":"1986","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"CIT0018","first-page":"163","volume":"15","author":"Saadat Javad P. M.","year":"2017","journal-title":"International Journal of Artificial Intelligence"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Sawa, Y. \n Bhakta, R. \n Harris, I. G. & \n Hadnagy, C. (2016). Detection of social engineering attacks through natural language processing of conversations. In 2016 IEEE Tenth International Conference on Semantic Computing (ICSC) (pp. 262\u2013265).","DOI":"10.1109\/ICSC.2016.95"},{"key":"CIT0020","unstructured":"Tsinganos, N. \n Sakellariou, G. \n Fouliras, P. & \n Mavridis, I. (2018). Towards an automated recognition system for chat-based social engineering attacks in enterprise environments. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, (pp. 53:1\u201353:10). ACM."}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2020.1747001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T02:50:35Z","timestamp":1597200635000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2020.1747001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7,2]]}},"alternative-id":["10.1080\/24751839.2020.1747001"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2020.1747001","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,10]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-12-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-03-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}