{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:21:25Z","timestamp":1755926485601,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_9","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection"],"prefix":"10.1007","author":[{"given":"M.","family":"S\u00e1nchez-Paniagua","sequence":"first","affiliation":[]},{"given":"E.","family":"Fidalgo","sequence":"additional","affiliation":[]},{"given":"V.","family":"Gonz\u00e1lez-Castro","sequence":"additional","affiliation":[]},{"given":"E.","family":"Alegre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ijhcs.2018.12.004","volume":"125","author":"A Ferreira","year":"2019","unstructured":"Ferreira, A., Teles, S.: Persuasion: how phishing emails can influence users and bypass security measures. Int. J. Hum. Comput. Stud. 125, 19\u201331 (2019)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1002\/acp.3594","volume":"33","author":"P Patel","year":"2019","unstructured":"Patel, P., Sarno, D.M., Lewis, J.E., Shoss, M., Neider, M.B., Bohil, C.J.: Perceptual representation of spam and phishing emails. Appl. Cogn. Psychol. 33, 1296\u20131304 (2019)","journal-title":"Appl. Cogn. Psychol."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Anti-Phishing\u00a0Working Group. Phishing Activity Trends Report 3Q (2019)","DOI":"10.1016\/S1361-3723(19)30025-9"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s42979-019-0011-2","volume":"1","author":"S Chanti","year":"2020","unstructured":"Chanti, S., Chithralekha, T.: Classification of anti-phishing solutions. SN Comput. Sci. 1(1), 11 (2020)","journal-title":"SN Comput. Sci."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Halgas, L., Agrafiotis, I., Nurse, J.R.C.: Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (2019)","DOI":"10.1007\/978-3-030-39303-8_17"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2019.02.011","volume":"83","author":"RS Rao","year":"2019","unstructured":"Rao, R.S., Pais, A.R.: Jail-Phish: an improved search engine based phishing detection system. Comput. Secur. 83, 246\u2013267 (2019)","journal-title":"Comput. Secur."},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.eswa.2018.07.067","volume":"115","author":"MA Adebowale","year":"2019","unstructured":"Adebowale, M.A., Lwin, K.T., S\u00e1nchez, E., Hossain, M.A.: Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text. Expert Syst. Appl. 115, 300\u2013313 (2019)","journal-title":"Expert Syst. Appl."},{"key":"9_CR8","unstructured":"Anti-Phishing\u00a0Working Group. Phishing Activity Trends Report 3Q (2017)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117, 345\u2013357 (2019)","journal-title":"Expert Syst. Appl."},{"key":"9_CR10","first-page":"51","volume":"4","author":"Y Cao","year":"2008","unstructured":"Cao, Y., Han, W., Le, Y.: Anti-phishing based on automated individual white-list. Proc. ACM Conf. Comput. Commun. Secur. 4, 51\u201359 (2008)","journal-title":"Proc. ACM Conf. Comput. Commun. Secur."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Rao Kompella, R., Gupta, M.: PhishNet: predictive blacklisting to detect phishing attacks. Proceedings - IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"9_CR12","first-page":"46","volume":"9","author":"AK Jain","year":"2016","unstructured":"Jain, A.K., Gupta, B.B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. Eurasip J. Inf. Secur. 9, 46 (2016)","journal-title":"Eurasip J. Inf. Secur."},{"key":"9_CR13","first-page":"1","volume":"269","author":"T Moore","year":"2007","unstructured":"Moore, T., Clayton, R.: Examining the impact of website take-down on phishing. ACM Int. Conf. Proc. Ser. 269, 1\u201313 (2007)","journal-title":"ACM Int. Conf. Proc. Ser."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi, M., Varjani, A.Y.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231\u2013242 (2016)","journal-title":"Expert Syst. Appl."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Shirazi, H., Bezawada, B., Ray, I.: Know thy domain name: Unbiased phishing detection using domain name based features. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pp. 69\u201375 (2018)","DOI":"10.1145\/3205977.3205992"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Buber, E., Diri, B., Sahingoz, O.K.: NLP Based Phishing Attack Detection from URLs. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-76348-4_59"},{"issue":"2","key":"9_CR17","first-page":"1","volume":"14","author":"Z Yue","year":"2007","unstructured":"Yue, Z., Hong, J., Cranor, L.: CANTINA: a content-based approach to detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 1\u201328 (2007)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14(2), 21 (2011)","DOI":"10.1145\/2019599.2019606"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Rao, R.S., Pais, A.R.: Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. (2018)","DOI":"10.1007\/s00521-017-3305-0"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","volume":"94","author":"Y Li","year":"2019","unstructured":"Li, Y., Yang, Z., Chen, X., Yuan, H., Liu, W.: A stacking model using URL and HTML features for phishing webpage detection. Fut. Generat. Comput. Syst. 94, 27\u201339 (2019)","journal-title":"Fut. Generat. Comput. Syst."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Chiew, K.L., Chang, E.H., Lin Tan, C., Abdullah, J., Yong, K.S.C.: Building standard offline anti-phishing dataset for benchmarking. Int. J. Eng. Technol. 7(4.31), 7\u201314 (2018)","DOI":"10.14419\/ijet.v7i4.31.23333"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, H., Yang, Z., Chen, X., Li, Y., Liu, W.: URL2Vec: URL modeling with character embeddings for fast and accurate phishing website detection. 17th IEEE International Conference on Ubiquitous Computing and Communications, pp. 265\u2013272, (2019)","DOI":"10.1109\/BDCloud.2018.00050"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:48:06Z","timestamp":1723484886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}