{"id":"https://openalex.org/W2555509818","doi":"https://doi.org/10.1142/s0219649216500428","title":"Deriving Correlated Sets of Website Features for Phishing Detection: A Computational Intelligence Approach","display_name":"Deriving Correlated Sets of Website Features for Phishing Detection: A Computational Intelligence Approach","publication_year":2016,"publication_date":"2016-11-27","ids":{"openalex":"https://openalex.org/W2555509818","doi":"https://doi.org/10.1142/s0219649216500428","mag":"2555509818"},"language":"en","primary_location":{"id":"doi:10.1142/s0219649216500428","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649216500428","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057725721","display_name":"Fadi Thabtah","orcid":null},"institutions":[{"id":"https://openalex.org/I156171363","display_name":"Nelson Marlborough Institute of Technology","ror":"https://ror.org/00wykxp39","country_code":"NZ","type":"education","lineage":["https://openalex.org/I156171363","https://openalex.org/I4387152882"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Fadi Thabtah","raw_affiliation_strings":["Applied Business and Computing, Nelson Marlborough Institute of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Applied Business and Computing, Nelson Marlborough Institute of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I156171363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052862524","display_name":"Neda Abdelhamid","orcid":"https://orcid.org/0000-0003-3638-8919"},"institutions":[{"id":"https://openalex.org/I1336277565","display_name":"Auckland Institute of Studies","ror":"https://ror.org/0090kax79","country_code":"NZ","type":"education","lineage":["https://openalex.org/I1336277565"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Neda Abdelhamid","raw_affiliation_strings":["Information Technology, Auckland Institute of Studies, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Information Technology, Auckland Institute of Studies, Auckland, New Zealand","institution_ids":["https://openalex.org/I1336277565"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057725721"],"corresponding_institution_ids":["https://openalex.org/I156171363"],"apc_list":null,"apc_paid":null,"fwci":9.2887,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.97826539,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"15","issue":"04","first_page":"1650042","last_page":"1650042"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9809706807136536},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7424052953720093},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.594157874584198},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5208571553230286},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4922443926334381},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4254886507987976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3516162633895874},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3238416314125061},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3201863765716553},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31044691801071167},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24370905756950378}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9809706807136536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7424052953720093},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.594157874584198},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5208571553230286},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4922443926334381},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4254886507987976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3516162633895874},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3238416314125061},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3201863765716553},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31044691801071167},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24370905756950378},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s0219649216500428","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219649216500428","pdf_url":null,"source":{"id":"https://openalex.org/S30163770","display_name":"Journal of Information & Knowledge Management","issn_l":"0219-6492","issn":["0219-6492","1793-6926"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information &amp; Knowledge Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:wsi:jikmxx:v:15:y:2016:i:04:p:1650042-01-1650042-17","is_oa":false,"landing_page_url":"http://www.worldscientific.com/doi/abs/10.1142/S0219649216500428","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W193832084","https://openalex.org/W1426199569","https://openalex.org/W1495061682","https://openalex.org/W1904130553","https://openalex.org/W1930835045","https://openalex.org/W2029470356","https://openalex.org/W2049488566","https://openalex.org/W2070896531","https://openalex.org/W2076354322","https://openalex.org/W2109293916","https://openalex.org/W2125055259","https://openalex.org/W2154053567","https://openalex.org/W2464060855","https://openalex.org/W4288079856"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2961085424","https://openalex.org/W3118827657","https://openalex.org/W3098409150","https://openalex.org/W2996625456","https://openalex.org/W4293525103","https://openalex.org/W2889702990","https://openalex.org/W3200179079","https://openalex.org/W2924131897","https://openalex.org/W3087493185"],"abstract_inverted_index":{"Classification":[0],"is":[1,25,45,66,88],"one":[2],"of":[3,19,43,73,85,107,120,155],"the":[4,20,62,77,96,104],"major":[5],"tasks":[6],"in":[7,95,100],"data":[8,143],"mining":[9,144],"which":[10,27],"aims":[11],"to":[12,32,49,60,67,89,102,151,163],"build":[13],"classifiers":[14],"for":[15,109],"decision":[16],"making.":[17],"One":[18,58],"most":[21],"recent":[22],"online":[23,33,47,51],"threats":[24],"phishing,":[26],"has":[28,123],"caused":[29],"significant":[30],"losses":[31],"shoppers,":[34],"electronic":[35],"businesses":[36],"and":[37,53],"financial":[38,56],"institutions.":[39],"A":[40],"common":[41,171],"way":[42,59],"phishing":[44,98,111,117,165],"impersonating":[46],"websites":[48],"deceive":[50],"users":[52],"steal":[54],"their":[55],"information.":[57],"guide":[61],"anti-phishing":[63],"classification":[64,145],"method":[65],"preliminarily":[68],"identify":[69,152],"a":[70],"minimal":[71,105],"set":[72,106],"related":[74],"features":[75,92,108,122,129,133,156,172],"so":[76],"search":[78],"space":[79],"can":[80],"be":[81],"reduced.":[82],"The":[83],"aim":[84],"this":[86],"paper":[87],"compare":[90],"different":[91],"assessment":[93],"techniques":[94],"website":[97],"context":[99],"order":[101],"determine":[103],"detecting":[110],"activities.":[112,166],"Experimental":[113],"results":[114],"on":[115],"real":[116],"datasets":[118],"consisting":[119],"30":[121],"been":[124,136,149,174],"conducted":[125],"using":[126],"three":[127,142],"known":[128],"selection":[130],"methods.":[131,146],"New":[132],"cutoffs":[134],"have":[135,148,173],"identified":[137],"after":[138],"statistical":[139],"analysis":[140],"utilising":[141],"We":[147],"able":[150,162],"new":[153],"clusters":[154],"that":[157],"when":[158],"used":[159],"together":[160],"are":[161],"detect":[164],"Further,":[167],"important":[168],"correlations":[169],"among":[170],"derived.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
