{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:12:27Z","timestamp":1762607547991},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030209506"},{"type":"electronic","value":"9783030209513"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20951-3_21","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"231-248","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Everything Is in the Name \u2013 A URL Based Approach for Phishing Detection"],"prefix":"10.1007","author":[{"given":"Harshal","family":"Tupsamudre","sequence":"first","affiliation":[]},{"given":"Ajeet Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Lodha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,19]]},"reference":[{"key":"21_CR1","unstructured":"APWG, February 2019. \n                    http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2018.pdf"},{"key":"21_CR2","unstructured":"DMOZ, February 2019. \n                    http:\/\/dmoz-odp.org\/"},{"key":"21_CR3","unstructured":"Google Safe Browsing, February 2019. \n                    https:\/\/safebrowsing.google.com\/"},{"key":"21_CR4","unstructured":"PhishTank, February 2019. \n                    https:\/\/www.antiphishing.org\/resources\/apwg-reports\/"},{"key":"21_CR5","unstructured":"Python Word Segmentation, February 2019. \n                    http:\/\/www.grantjenks.com\/docs\/wordsegment\/"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Ardi, C., Heidemann, J.: Auntietuna: personalized content-based phishing detection. In: Proceedings of the NDSS Workshop on Usable Security. The Internet Society, San Diego, California, USA, February 2016. \n                    http:\/\/www.isi.edu\/%7ejohnh\/PAPERS\/Ardi16a.html","DOI":"10.14722\/usec.2016.23012"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. Internet Society, USEC (2015)","DOI":"10.14722\/usec.2015.23009"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"CJ, G., Pandit, S., Vaddepalli, S., Tupsamudre, H., Banahatti, V., Lodha, S.: Phishy - a serious game to train enterprise users on phishing awareness. In: Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, CHI PLAY 2018, pp. 169\u2013181. ACM, New York (2018). \n                    https:\/\/doi.org\/10.1145\/3270316.3273042","DOI":"10.1145\/3270316.3273042"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006). \n                    https:\/\/doi.org\/10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Felt, A.P., et al.: Improving SSL warnings: comprehension and adherence. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, pp. 2893\u20132902. ACM, New York (2015). \n                    https:\/\/doi.org\/10.1145\/2702123.2702442","DOI":"10.1145\/2702123.2702442"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM 2007, pp. 1\u20138. ACM, New York (2007). \n                    https:\/\/doi.org\/10.1145\/1314389.1314391","DOI":"10.1145\/1314389.1314391"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Commun. ACM 55(1), 74\u201381 (2012). \n                    https:\/\/doi.org\/10.1145\/2063176.2063197","journal-title":"Commun. ACM"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091\u20132121 (2013). \n                    https:\/\/doi.org\/10.1109\/SURV.2013.032213.00009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Kintis, P., et al.: Hiding in plain sight: a longitudinal study of combosquatting abuse. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 569\u2013586. ACM, New York (2017). \n                    https:\/\/doi.org\/10.1145\/3133956.3134002","DOI":"10.1145\/3133956.3134002"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Le, A., Markopoulou, A., Faloutsos, M.: PhishDef: URL names say it all. In: 2011 Proceedings IEEE INFOCOM, pp. 191\u2013195, April 2011. \n                    https:\/\/doi.org\/10.1109\/INFCOM.2011.5934995","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 1245\u20131254. ACM, New York (2009). \n                    https:\/\/doi.org\/10.1145\/1557019.1557153","DOI":"10.1145\/1557019.1557153"},{"issue":"4","key":"21_CR18","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TNSM.2014.2377295","volume":"11","author":"S Marchal","year":"2014","unstructured":"Marchal, S., Fran\u00e7ois, J., State, R., Engel, T.: Phishstorm: detecting phishing with streaming analytics. IEEE Trans. Netw. Serv. Manag. 11(4), 458\u2013471 (2014). \n                    https:\/\/doi.org\/10.1109\/TNSM.2014.2377295","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 323\u2013333, June 2016. \n                    https:\/\/doi.org\/10.1109\/ICDCS.2016.10","DOI":"10.1109\/ICDCS.2016.10"},{"key":"21_CR20","unstructured":"McGrath, D.K., Gupta, M.: Behind phishing: an examination of phisher modi operandi. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET 2008, pp. 4:1\u20134:8. USENIX Association, Berkeley, CA, USA (2008). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1387709.1387713"},{"key":"21_CR21","unstructured":"Norvig, P.: Natural Language Corpus Data: Beautiful Data, February 2019. \n                    http:\/\/norvig.com\/ngrams\/"},{"key":"21_CR22","doi-asserted-by":"publisher","unstructured":"Reeder, R.W., Felt, A.P., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An experience sampling study of user reactions to browser warnings in the field. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, pp. 512:1\u2013512:13. ACM, New York (2018). \n                    https:\/\/doi.org\/10.1145\/3173574.3174086","DOI":"10.1145\/3173574.3174086"},{"key":"21_CR23","unstructured":"Sahoo, D., Liu, C., Hoi, S.C.: Malicious URL detection using machine learning: a survey. arXiv preprint \n                    arXiv:1701.07179\n                    \n                   (2017)"},{"key":"21_CR24","doi-asserted-by":"publisher","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 88\u201399. ACM, New York (2007). \n                    https:\/\/doi.org\/10.1145\/1280680.1280692","DOI":"10.1145\/1280680.1280692"},{"key":"21_CR25","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam (CEAS), California, USA (2009)"},{"key":"21_CR26","unstructured":"Verizon: 2018 data breach investigations report, February 2019. \n                    http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_DBIR_2018_Report_en_xg.pdf"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Verma, R., Das, A.: What\u2019s in a URL: fast feature extraction and malicious URL detection. In: Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics, IWSPA 2017, pp. 55\u201363. ACM, New York (2017). \n                    https:\/\/doi.org\/10.1145\/3041008.3041016","DOI":"10.1145\/3041008.3041016"},{"key":"21_CR28","unstructured":"Wang, W., Shirley, K.: Breaking bad: detecting malicious domains using word segmentation. arXiv preprint \n                    arXiv:1506.04111\n                    \n                   (2015)"},{"key":"21_CR29","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS 2010 (2010). \n                    http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/08.pdf"},{"key":"21_CR30","doi-asserted-by":"publisher","first-page":"29891","DOI":"10.1109\/ACCESS.2019.2895751","volume":"7","author":"W Yang","year":"2019","unstructured":"Yang, W., Zuo, W., Cui, B.: Detecting malicious urls via a keyword-based convolutional gated-recurrent-unit neural network. IEEE Access 7, 29891\u201329900 (2019). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2019.2895751","journal-title":"IEEE Access"},{"key":"21_CR31","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 639\u2013648. ACM, New York (2007). \n                    https:\/\/doi.org\/10.1145\/1242572.1242659","DOI":"10.1145\/1242572.1242659"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20951-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:08:05Z","timestamp":1560726485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20951-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030209506","9783030209513"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20951-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSCML","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyber Security Cryptography and Machine Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beer-Sheva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cscml2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cs.bgu.ac.il\/~fradmin\/cscml19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}