{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:08Z","timestamp":1729619048078,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.76","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"628-635","source":"Crossref","is-referenced-by-count":9,"title":["Profiling Phishing Email Based on Clustering Approach"],"prefix":"10.1109","author":[{"given":"Isredza Rahmi A.","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Jemal H.","family":"Abawajy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"108","article-title":"Classifying phishing emails using confidence-weighted linear classifiers","author":"basnet","year":"2011","journal-title":"International Conference on Information Security and Artificial Intelligence (ISAI 2010) IEEE"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2012.6266364"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.268"},{"key":"15","first-page":"25","article-title":"Applying clustering and ensemble clustering approaches to phishing profiling","author":"yearwood","year":"2009","journal-title":"The 6th Australasian Data Mining Conference (AusDM"},{"key":"16","first-page":"235","article-title":"Consensus clustering and supervised classifications for profiling phishing emails in internet commerce security","volume":"6232","author":"kang","year":"2010","journal-title":"Knowledge Management and Acquisition for Smart Systems and Services Lecture Notes in Computer Science Springer Berlin Heidelberg"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.911438"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-011-0031-y"},{"journal-title":"Profiling the Newborn A Prospective Gene Technology?","first-page":"1","year":"2005","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860034"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199418"},{"key":"20","first-page":"1","article-title":"Using market basket analysis to estimate potential revenue increases for a small university bookstore","volume":"4","author":"hoanca","year":"2011","journal-title":"Conference for Information Systems Applied Research 2011 (CONISAR) Wilmington North Carolina USA"},{"journal-title":"Phishing Activity Trends Report","year":"2011","key":"22"},{"journal-title":"Phishing Activity Trends Report","year":"2012","key":"23"},{"journal-title":"Phishing Activity Trends Report","year":"2012","key":"24"},{"journal-title":"SPSS Twostep Cluster A First Evaluation","year":"2004","author":"bacher","key":"25"},{"journal-title":"Anti-Phishing Studies","year":"2012","author":"khonji","key":"26"},{"journal-title":"Cluster (TwoStep Clustering Algorithms)-IBM-United States","year":"0","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"61","DOI":"10.24846\/v22i2y101307","article-title":"Using feature selection and classification scheme for automating phishing email detection","volume":"22","author":"hamid","year":"2013","journal-title":"Studies in Informatics and Control"},{"journal-title":"Public Corpus","year":"2012","key":"3"},{"journal-title":"Phishing Corpus","year":"2012","author":"nazario","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.126"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030392"},{"key":"7","first-page":"266","article-title":"Hybrid feature selection for phishing email detection","author":"hamid","year":"2011","journal-title":"The 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) Springer Berlin Germany"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2010.5706696"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"9","first-page":"1","article-title":"Cusp: Customizable and usable spam filters for detecting phishing emails","author":"chandrasekaran","year":"2011","journal-title":"NYS Symposium Albany NY 2011"},{"key":"8","first-page":"1","article-title":"Phishing e-mail detection using ontology concept and nai?ve bayes algorithm","volume":"2","author":"bazarganigilani","year":"2011","journal-title":"International Journal of Research and Reviews in Computer Science (IJRRCS) Science Academy Publisher United Kingdom"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680895.pdf?arnumber=6680895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T01:36:48Z","timestamp":1564969008000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.76","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}