{"id":"https://openalex.org/W2801332331","doi":"https://doi.org/10.1093/comjnl/bxy039","title":"SmiDCA: An Anti-Smishing Model with Machine Learning Approach","display_name":"SmiDCA: An Anti-Smishing Model with Machine Learning Approach","publication_year":2018,"publication_date":"2018-04-05","ids":{"openalex":"https://openalex.org/W2801332331","doi":"https://doi.org/10.1093/comjnl/bxy039","mag":"2801332331"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy039","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy039","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079409206","display_name":"Gunikhan Sonowal","orcid":"https://orcid.org/0000-0001-5626-2411"},"institutions":[{"id":"https://openalex.org/I175691731","display_name":"Pondicherry University","ror":"https://ror.org/01a3mef16","country_code":"IN","type":"education","lineage":["https://openalex.org/I175691731"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gunikhan Sonowal","raw_affiliation_strings":["Department of Computer Science, Pondicherry University, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Pondicherry University, Puducherry, India","institution_ids":["https://openalex.org/I175691731"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044309126","display_name":"K. S. Kuppusamy","orcid":"https://orcid.org/0000-0002-2382-2379"},"institutions":[{"id":"https://openalex.org/I175691731","display_name":"Pondicherry University","ror":"https://ror.org/01a3mef16","country_code":"IN","type":"education","lineage":["https://openalex.org/I175691731"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K S Kuppusamy","raw_affiliation_strings":["Department of Computer Science, Pondicherry University, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Pondicherry University, Puducherry, India","institution_ids":["https://openalex.org/I175691731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044309126"],"corresponding_institution_ids":["https://openalex.org/I175691731"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":9.4474,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.97976313,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"61","issue":"8","first_page":"1143","last_page":"1157"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9453054666519165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8144738674163818},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5874321460723877},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5589962005615234},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5433713793754578},{"id":"https://openalex.org/keywords/short-message-service","display_name":"Short Message Service","score":0.4335975646972656},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42329320311546326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3460831642150879},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2834208011627197},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19692620635032654}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9453054666519165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8144738674163818},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5874321460723877},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5589962005615234},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5433713793754578},{"id":"https://openalex.org/C74558129","wikidata":"https://www.wikidata.org/wiki/Q43024","display_name":"Short Message Service","level":2,"score":0.4335975646972656},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42329320311546326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3460831642150879},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2834208011627197},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19692620635032654},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy039","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy039","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W228866354","https://openalex.org/W336973054","https://openalex.org/W1481128830","https://openalex.org/W1550099438","https://openalex.org/W1602368597","https://openalex.org/W1795755771","https://openalex.org/W1967390364","https://openalex.org/W2011211026","https://openalex.org/W2020648356","https://openalex.org/W2037021247","https://openalex.org/W2048587526","https://openalex.org/W2072981546","https://openalex.org/W2110357431","https://openalex.org/W2148403395","https://openalex.org/W2185524891","https://openalex.org/W2303818449","https://openalex.org/W2321445989","https://openalex.org/W2323969083","https://openalex.org/W2366087885","https://openalex.org/W2399562741","https://openalex.org/W2410824883","https://openalex.org/W2461460927","https://openalex.org/W2483391179","https://openalex.org/W2487800177","https://openalex.org/W2507573305","https://openalex.org/W2513371352","https://openalex.org/W2566352709","https://openalex.org/W2576815293","https://openalex.org/W2581301280","https://openalex.org/W2605432626","https://openalex.org/W2608059542","https://openalex.org/W2612712811","https://openalex.org/W2616397616","https://openalex.org/W2739066632","https://openalex.org/W2998216295","https://openalex.org/W3126834817","https://openalex.org/W4205699531","https://openalex.org/W4285719527","https://openalex.org/W6632813158","https://openalex.org/W6638539852","https://openalex.org/W6686812796","https://openalex.org/W6714845088","https://openalex.org/W6718689368","https://openalex.org/W6741388753","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W2305322260","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W4388020458","https://openalex.org/W2472747690"],"abstract_inverted_index":{"Phishing":[0,49],"has":[1,87,125],"become":[2],"a":[3],"serious":[4],"cyber-security":[5],"issue,":[6],"and":[7,95,108,117,134,137,155],"it":[8,39],"is":[9,45],"spreading":[10],"through":[11],"various":[12,93],"media":[13],"such":[14],"as":[15],"e-mail,":[16],"SMS":[17],"to":[18,33,64],"capture":[19],"the":[20,35,66,132,138,158,163,175],"victim\u2019s":[21,67],"critical":[22],"profile":[23],"information.":[24],"Although":[25],"many":[26],"novel":[27],"anti-phishing":[28,74],"techniques":[29],"have":[30],"been":[31,126],"developed":[32],"forestall":[34],"progress":[36],"of":[37,48,121,140,142,149,168,174],"phishing,":[38],"remains":[40],"an":[41,46,73,166],"unresolved":[42],"issue.":[43],"Smishing":[44],"incarnation":[47],"attack,":[50],"which":[51],"utilizes":[52],"Short":[53],"Messaging":[54],"Service":[55],"(SMS)":[56],"or":[57],"simple":[58],"text":[59],"message":[60],"on":[61,81,114,130],"mobile":[62],"phones":[63],"lure":[65],"online":[68],"credentials.":[69],"This":[70],"paper":[71],"presents":[72],"model":[75,86,104,124,164],"entitled":[76],"\u2018SmiDCA\u2019":[77],"(SMIshing":[78],"Detection":[79],"based":[80],"Correlation":[82],"Algorithm).":[83],"The":[84,102,123],"proposed":[85],"collected":[88],"different":[89],"smishing":[90],"messages":[91],"from":[92],"sources,":[94],"39":[96],"distinct":[97],"features":[98,176],"were":[99,112,177],"extracted":[100],"initially.":[101],"SmiDCA":[103],"incorporates":[105],"dimensionality":[106],"reduction,":[107],"machine":[109],"Learning-based":[110],"experiments":[111,129,144],"conducted":[113],"without":[115],"(BFSA)":[116],"with":[118,128],"(AFSA)":[119],"reduction":[120],"features.":[122],"validated":[127],"both":[131,141],"English":[133,153],"non-English":[135,159],"datasets":[136],"results":[139],"these":[143],"are":[145],"encouraging":[146],"in":[147],"terms":[148],"accuracy:":[150],"96.40%":[151],"for":[152,157],"dataset":[154],"90.33%":[156],"dataset.":[160],"In":[161],"addition,":[162],"achieved":[165],"accuracy":[167],"96.16%":[169],"even":[170],"after":[171],"nearly":[172],"half":[173],"pruned.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
