<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19040" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19040?output=omeka-xml" accessDate="2026-04-09T04:50:05+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162194">
              <text>Combatting Phishing Threats: An NLP-Based Programming Approach for Detection of Malicious Emails and Texts</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162195">
              <text>AI-based expert systems and deep learning (ML); Cybersecurity; Decision trees; Email security; Feature extraction; Logistic regression; NLP-based programming (Natural Language Processing); Phishing; Text classification</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162196">
              <text>Attackers are employing more advanced strategies to trick people into divulging private information or carrying out harmful deeds, and phishing is still a serious cybersecurity risk. We provide a new method in this study that combines algorithms based on AI-based expert systems and deep learning (ML) with the use of NLP-based programming (NLP) approaches to identify fraudulent emails and messages. Using a variety of datasets that include samples of both authentic and phishing messages, our approach preprocesses textual data, extracts relevant characteristics, and trains AI-based expert systems and deep learning models. Metrics including accuracy, precision, recall, and F1-score are used to assess the effectiveness of different AI-based expert systems and deep learning methods, such as logistic regression, random forests, decision trees, and neural networks, among others. To collect semantic information and increase detection accuracy, we also investigate the integration of sophisticated NLP-based techniques, such as word embeddings. The efficacy of our suggested strategy in reducing this common cybersecurity issue is highlighted by our results, which show promising performance in correctly recognizing phishing attempts.  The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162197">
              <text>Upreti K.; Patil H.P.; Bhende V.S.; Hundekari S.; Divakaran P.; Vats P.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="162198">
              <text>Lecture Notes in Networks and Systems, Vol-1111 LNNS, pp. 83-94.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="162199">
              <text>Springer Science and Business Media Deutschland GmbH</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162200">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="162201">
              <text>&lt;a href="https://doi.org/10.1007/978-981-97-6681-9_8" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1007/978-981-97-6681-9_8&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85210258450&amp;amp;doi=10.1007%2F978-981-97-6681-9_8&amp;amp;partnerID=40&amp;amp;md5=153cb5a7e103ca6502e69100545373aa" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85210258450&amp;amp;doi=10.1007%2f978-981-97-6681-9_8&amp;amp;partnerID=40&amp;amp;md5=153cb5a7e103ca6502e69100545373aa&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162202">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="162203">
              <text>ISSN: 23673370; ISBN: 978-981976680-2</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162204">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162205">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="162206">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="162207">
              <text>Upreti K., CHRIST(Deemed to Be University), Delhi NCR Campus, India; Patil H.P., Symbiosis Skills And Professional University, KiwalePune, India; Bhende V.S., AISSMS IOIT Pune, Pune, India; Hundekari S., School of Engineering and Technology, Pimpri Chinchwad University, Pune, India; Divakaran P., Himalayan University, Arunachal Pradesh, Itanagar, India; Vats P., Manipal University Jaipur, Rajasthan, Jaipur, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
