{"id":"https://openalex.org/W2068185042","doi":"https://doi.org/10.1109/trustcom.2013.76","title":"Profiling Phishing Email Based on Clustering Approach","display_name":"Profiling Phishing Email Based on Clustering Approach","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2068185042","doi":"https://doi.org/10.1109/trustcom.2013.76","mag":"2068185042"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.76","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027031799","display_name":"Isredza Rahmi A. Hamid","orcid":"https://orcid.org/0000-0002-4269-0762"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Isredza Rahmi A. Hamid","raw_affiliation_strings":["[School of Information Technology, Deakin University, Burwood, VIC, Australia]"],"affiliations":[{"raw_affiliation_string":"[School of Information Technology, Deakin University, Burwood, VIC, Australia]","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal H. Abawajy","raw_affiliation_strings":["[School of Information Technology, Deakin University, Burwood, VIC, Australia]"],"affiliations":[{"raw_affiliation_string":"[School of Information Technology, Deakin University, Burwood, VIC, Australia]","institution_ids":["https://openalex.org/I149704539"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.172,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":17,"citation_normalized_percentile":{"value":0.874804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":"6232","issue":null,"first_page":"628","last_page":"635"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Multi-label Text Classification in Machine Learning","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9919,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8921646},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.622688},{"id":"https://openalex.org/keywords/url-filtering","display_name":"URL Filtering","score":0.508679},{"id":"https://openalex.org/keywords/behavioral-analysis","display_name":"Behavioral Analysis","score":0.508667},{"id":"https://openalex.org/keywords/spam-detection","display_name":"Spam Detection","score":0.50607},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.500403},{"id":"https://openalex.org/keywords/k-means-clustering","display_name":"k-means clustering","score":0.48836607}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.93587315},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8921646},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.8424643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7605859},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4992125},{"id":"https://openalex.org/C207968372","wikidata":"https://www.wikidata.org/wiki/Q310401","display_name":"k-means clustering","level":3,"score":0.48836607},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38407665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35528415},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22164571},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1886557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.76","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1510540210","https://openalex.org/W1525618747","https://openalex.org/W1567605630","https://openalex.org/W2025848081","https://openalex.org/W2028195579","https://openalex.org/W2051297055","https://openalex.org/W2071254787","https://openalex.org/W2074937974","https://openalex.org/W2091534410","https://openalex.org/W2130430857","https://openalex.org/W2133990480","https://openalex.org/W2134750673","https://openalex.org/W2144006819","https://openalex.org/W2153293405","https://openalex.org/W2184351121","https://openalex.org/W2291567251","https://openalex.org/W2546154814","https://openalex.org/W3104640662","https://openalex.org/W4251777439"],"related_works":["https://openalex.org/W4401883448","https://openalex.org/W4313193953","https://openalex.org/W2967215460","https://openalex.org/W2385548616","https://openalex.org/W2378227553","https://openalex.org/W2149202530","https://openalex.org/W2120258591","https://openalex.org/W2113424041","https://openalex.org/W1789480965","https://openalex.org/W1584028106"],"abstract_inverted_index":{"In":[0],"this":[1,119],"paper,":[2],"an":[3,22,124],"approach":[4,138],"for":[5,115,156],"profiling":[6,59,66,144],"email-born":[7,145],"phishing":[8,13,33,47,53,61,78,146],"activities":[9,14,34],"is":[10,48,113],"proposed.":[11],"Profiling":[12],"are":[15,93],"useful":[16],"in":[17,43,76,139],"determining":[18],"the":[19,44,60,65,73,77,106,110,116,129,153,158],"activity":[20],"of":[21,28,46,52,100,105,118,131,161],"individual":[23],"or":[24],"a":[25,69],"particular":[26],"group":[27],"phishers.":[29],"By":[30],"generating":[31],"profiles,":[32],"can":[35],"be":[36],"well":[37],"understood":[38],"and":[39],"observed.":[40],"Typically,":[41],"work":[42],"area":[45],"intended":[49],"at":[50,109],"detection":[51],"emails,":[54],"whereas":[55],"we":[56,84],"concentrate":[57],"on":[58,88],"email.":[62],"We":[63,121],"formulate":[64],"problem":[67,71],"as":[68,80],"clustering":[70,89,107,137],"using":[72],"various":[74],"features":[75],"emails":[79],"feature":[81],"vectors.":[82],"Further,":[83],"generate":[85,97],"profiles":[86,99],"based":[87],"predictions.":[90],"These":[91],"predictions":[92],"further":[94],"utilized":[95],"to":[96,127],"complete":[98],"these":[101],"emails.":[102],"The":[103],"performance":[104,130],"algorithms":[108,134],"earlier":[111],"stage":[112],"crucial":[114],"effectiveness":[117],"model.":[120,141],"carried":[122],"out":[123],"experimental":[125],"evaluation":[126],"determine":[128],"many":[132],"classification":[133],"by":[135],"incorporating":[136],"our":[140],"Our":[142],"proposed":[143],"algorithm":[147],"(ProEP)":[148],"demonstrates":[149],"promising":[150],"results":[151],"with":[152],"RatioSize":[154],"rules":[155],"selecting":[157],"optimal":[159],"number":[160],"clusters.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2068185042","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2024-11-22T18:11:03.017256","created_date":"2016-06-24"}