{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:44:01Z","timestamp":1759092241663},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308843"},{"type":"electronic","value":"9783540322924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11599593_15","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T09:50:58Z","timestamp":1132739458000},"page":"195-209","source":"Crossref","is-referenced-by-count":6,"title":["SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Hiroaki","family":"Hazeyama","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Kumar, A.: Phishing - A new age weapon. Technical report, Open Web Application Securitry Project, OWASP (2005)"},{"key":"15_CR2","unstructured":"Tally, G., Thomas, R., Vleck, T.V.: Anti-Phishing: Best Practices for Institutions and Consumers. Technical report, Anti-Phishng Working Group (2004)"},{"key":"15_CR3","unstructured":"Anti-Phishing Working Group: Phishing Activity Trends Report (June 2005)"},{"key":"15_CR4","unstructured":"McCall, T., Moss, R.: Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Damage Consumer Trust in Online Commerce (2005)"},{"key":"15_CR5","unstructured":"Drake, C.E., Oliver, J.J., Koontz, E.J.: Anatomy of a Phishing Email. In: Proceedings of CEAS 2004 (2004)"},{"key":"15_CR6","unstructured":"Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: An internet con game. In: Proceedings of NISSC 1997 (1997)"},{"key":"15_CR7","unstructured":"Blue Coat Systems, Inc.: Spyware Prevention - Blue Coat Systems. Inc. - proxy servers (2005)"},{"key":"15_CR8","unstructured":"F5 Networks, Inc.: Trafficshield Application Firewall (1998-2005)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.: The Battle Against Phishng: Dynamic Security Skins. In: Proceedings of SOUPS 2005 (2005)","DOI":"10.1145\/1073001.1073009"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11427896_9","volume-title":"Human Interactive Proofs","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.: Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 127\u2013141. Springer, Heidelberg (2005)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks with AntiPhish. In: Proceedings of 29th COMPSAC 2005 (2005)","DOI":"10.1109\/COMPSAC.2005.126"},{"key":"15_CR12","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-side defense against web-based identity theft. In: Proceedings of NDSS 2004 (2004)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Wenyin, L., Huang, G., Xiaoyue, L., Min, Z., Deng, X.: Detection of Phishing Webpages based on Visual Similarity. In: Proceedings of WWW 2005 (2005)","DOI":"10.1145\/1062745.1062868"},{"key":"15_CR14","unstructured":"CoreStreet: SpoofStick (2005)"},{"key":"15_CR15","unstructured":"malwareremover: Phishing Sweeper (2005)"},{"key":"15_CR16","unstructured":"Herzberg, A., Gbara, A.: TrustBar: Protecting (even Na\u00efve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive, Report 2004\/155 (2004)"},{"key":"15_CR17","unstructured":"Netcraft: Netcraft Toolbar (2005)"},{"key":"15_CR18","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: SpoofGuard: Preventing online identity theft and phishing. Cryptology ePrint Archive, Report 2004\/155 (2004)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R., Garfinkel, S.: Do Security Toolbars Actually Prevent Phishing Attack? In: Proceedings of SOUPS 2005, poster session (2005)","DOI":"10.1145\/1124772.1124863"},{"key":"15_CR20","unstructured":"Van der Merwe, A., Loock, M., Dabrowski, M.: Characteristics and Responsibilities Involved in a Phishing Attack. In: Proceedings of ISICT 2005 (2005)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11507840_9","volume-title":"Financial Cryptography and Data Security","author":"M. Jakobsson","year":"2005","unstructured":"Jakobsson, M.: Modeling and Preventing Phishing Attacks. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 89\u201389. Springer, Heidelberg (2005)"},{"key":"15_CR22","unstructured":"Jakobsson, M.: Distributed Phishing Attacks. In: Proceedings of DIMACS Workshop on Theft in E-Commerce (2005)"},{"key":"15_CR23","unstructured":"Anti-Phishing Working Group: Anti-Phishing Working Group: Resources (2005)"},{"key":"15_CR24","unstructured":"Adida, B., Hohenberger, S., Rivest, R.L.: Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails. In: Proceedings of DIMACS Workshop on Theft in E-Commerce (2005)"},{"key":"15_CR25","unstructured":"Hohenberger, S.: Separable Identity-Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks. In: Proceedings of DIMACS Workshop on Theft in E-Commerce (2005)"},{"key":"15_CR26","unstructured":"Kaes, R.J., Young, S.: Tinyproxy (2004)"},{"key":"15_CR27","unstructured":"Privoxy Developers: Privoxy (2001-2004)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol \u2013 HTTP\/1.1. RFC 2616, Internet Engineering Task Force (1999)","DOI":"10.17487\/rfc2616"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Elson, J., Cepra, A.: Internet Content Adaptation Protocol(ICAP). RFC 3507, Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3507"},{"key":"15_CR30","unstructured":"Free Software Foundation, Inc.: GNU Wget (2005)"},{"key":"15_CR31","unstructured":"The Apache Software Foundation: The Apache Software Foundation (1999-2005)"}],"container-title":["Lecture Notes in Computer Science","Technologies for Advanced Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11599593_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:00:51Z","timestamp":1619506851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11599593_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308843","9783540322924"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11599593_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}