{"id":"https://openalex.org/W4378417285","doi":"https://doi.org/10.1109/isdfs58141.2023.10131884","title":"Feature Selection for Phishing Website by Using Naive Bayes Classifier","display_name":"Feature Selection for Phishing Website by Using Naive Bayes Classifier","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378417285","doi":"https://doi.org/10.1109/isdfs58141.2023.10131884"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081135407","display_name":"Twana Mustafa","orcid":"https://orcid.org/0000-0001-5352-2628"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Twana Mustafa","raw_affiliation_strings":["F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey"],"affiliations":[{"raw_affiliation_string":"F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037649961","display_name":"Murat Karabatak","orcid":"https://orcid.org/0000-0002-6719-7421"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Murat Karabatak","raw_affiliation_strings":["F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey"],"affiliations":[{"raw_affiliation_string":"F&#x0131;rat University,Department of Software Engineering,Elazig,Turkey","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081135407"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.6711,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.93682534,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.9064968824386597},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7992984056472778},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7809295058250427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.746271014213562},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6160086393356323},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5631611943244934},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46674400568008423},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42645150423049927},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4224788248538971},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4152528643608093},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3333923816680908},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.27977219223976135},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.27908629179000854},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1827903687953949}],"concepts":[{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.9064968824386597},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7992984056472778},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7809295058250427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746271014213562},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6160086393356323},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5631611943244934},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46674400568008423},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42645150423049927},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4224788248538971},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4152528643608093},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3333923816680908},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.27977219223976135},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.27908629179000854},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1827903687953949}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs58141.2023.10131884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"No poverty","id":"https://metadata.un.org/sdg/1","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W259338706","https://openalex.org/W2801182074","https://openalex.org/W2957480063","https://openalex.org/W3036676281","https://openalex.org/W3036813579","https://openalex.org/W3089418071","https://openalex.org/W3169509541","https://openalex.org/W3196436341","https://openalex.org/W4200495795","https://openalex.org/W4205709024","https://openalex.org/W4206473785","https://openalex.org/W4210417849","https://openalex.org/W4214652084","https://openalex.org/W4225917617","https://openalex.org/W4281760297","https://openalex.org/W4285144607","https://openalex.org/W4294811519","https://openalex.org/W4294855463","https://openalex.org/W4307717478","https://openalex.org/W4317439091","https://openalex.org/W4319660929","https://openalex.org/W4328097127","https://openalex.org/W4361010314","https://openalex.org/W6849607244"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4388020458"],"abstract_inverted_index":{"The":[0,107,116],"Internet":[1],"is":[2,47,82,121],"gradually":[3],"becoming":[4],"a":[5,50,54,68,166],"necessary":[6],"and":[7,35,43,56,63,71,73,76,126,151],"important":[8],"tool":[9],"of":[10,24,37,52,118],"human\u2019s":[11],"everyday":[12],"life.":[13],"But":[14],"internet":[15],"users":[16],"might":[17],"have":[18,29],"poor":[19],"security":[20,75],"for":[21,98,139,147,161,168],"different":[22],"kinds":[23],"web":[25],"threats,":[26],"which":[27],"may":[28],"an":[30],"effect":[31],"on":[32],"monetary":[33],"damage":[34],"loss":[36],"clients\u2019":[38],"trust":[39],"in":[40,110],"online":[41,44],"trading":[42],"banking.":[45],"Phishing":[46,99],"described":[48],"as":[49,67],"skill":[51],"impersonating":[53],"website":[55,100],"trustful":[57],"project":[58],"aiming":[59],"to":[60,122,135],"get":[61],"private":[62],"secret":[64],"information":[65],"such":[66],"user":[69],"name":[70],"password":[72],"social":[74],"credit":[77],"card":[78],"number.":[79],"However,":[80],"there":[81],"no":[83],"single":[84],"solution":[85],"that":[86],"can":[87],"catch":[88],"most":[89],"phishing":[90,140],"attacks.":[91],"This":[92],"paper":[93,120],"discusses":[94],"the":[95,103,124,128,133,149,169,172],"Feature":[96],"Selection":[97],"by":[101,171],"using":[102],"Naive":[104],"Bayes":[105],"classifier.":[106,174],"dataset":[108,125,150,170],"used":[109,143],"this":[111,119],"study":[112],"has":[113],"thirty-one":[114],"attributes.":[115],"aim":[117],"reduce":[123],"find":[127],"best":[129],"performance":[130,160],"system":[131,152],"having":[132],"ability":[134],"make":[136],"right":[137],"classifications":[138],"datasets.":[141],"We":[142],"feature":[144,157],"selection":[145,158],"algorithms":[146],"reducing":[148],"performance,":[153],"also":[154],"comparing":[155],"among":[156],"algorithms\u2019":[159],"each":[162],"dataset,":[163],"then":[164],"making":[165],"classification":[167],"na\u00efve":[173]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
