{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:13:15Z","timestamp":1725700395694},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100013433","name":"TII","doi-asserted-by":"publisher","award":["RIF-20130,EU2205"],"id":[{"id":"10.13039\/100013433","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361457","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T14:38:38Z","timestamp":1703515118000},"page":"0684-0689","source":"Crossref","is-referenced-by-count":0,"title":["Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis"],"prefix":"10.1109","author":[{"given":"Betiel","family":"Tesfom","sequence":"first","affiliation":[{"name":"College of Technological Innovation, Zayed University,Abu Dhabi,UAE"}]},{"given":"Feven","family":"Belay","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University,Abu Dhabi,UAE"}]},{"given":"Snit","family":"Daniel","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University,Abu Dhabi,UAE"}]},{"given":"Reem","family":"Salem","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University,Abu Dhabi,UAE"}]},{"given":"Safa","family":"Otoum","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.beth.2020.05.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/Nature14539"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864993"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app13084649"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110945"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010232"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21833\/ijaas.2020.07.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SYNCHROINFO51390.2021.9488344"},{"journal-title":"in Emerging Technologies in Data Mining and Information Security, Springer, Singapore","article-title":"Flight Arrival Delay Prediction Using Gradient Boosting Classifier","year":"2019","author":"Abraham","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICECONF57129.2023.10083749"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID52796.2021.00091"},{"article-title":"An Introduction to Logistic Regression in Python","volume-title":"Simplilearn.com","year":"2023","author":"Banoula","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AISC56616.2023.10085511"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA52141.2021.9377277"},{"article-title":"Naive Bayes Classifier Explained: Applications and Practice Problems of Naive Bayes Classifier","volume-title":"Analytics Vidhya","year":"2023","author":"Ray","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443034"},{"article-title":"Guide to AUC ROC Curve in Machine Learning: What Is Specificity","volume-title":"Analytics Vidhya","year":"2023","author":"Bhandari","key":"ref20"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361457.pdf?arnumber=10361457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T15:45:08Z","timestamp":1705074308000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361457","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}