{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:26Z","timestamp":1763468246125},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_18","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:02:35Z","timestamp":1417611755000},"page":"318-337","source":"Crossref","is-referenced-by-count":10,"title":["Catching Classical and Hijack-Based Phishing Attacks"],"prefix":"10.1007","author":[{"given":"Tanmay","family":"Thakur","sequence":"first","affiliation":[]},{"given":"Rakesh","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proc. Anti-phishing Working Group\u2019s 2nd Annual eCrime Researchers Summit, pp. 60\u201369. ACM (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"18_CR2","unstructured":"Anti-Phishing Working Group. Phishing activity trends report - h1 2011. In: APWG Phishing Trends Reports (2011)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Basnet, R., Mukkamala, S., Sung, A.: Detection of phishing attacks: A machine learning approach. Soft Computing Applications in Industry, 373\u2013383 (2008)","DOI":"10.1007\/978-3-540-77465-5_19"},{"issue":"1","key":"18_CR4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3233\/JCS-2010-0371","volume":"18","author":"A. Bergholz","year":"2010","unstructured":"Bergholz, A., Beer, J.D., Glahn, S., Moens, M.-F., Paa\u00df, G., Strobel, S.: New filtering approaches for phishing email. Journal of Computer Security\u00a018(1), 7\u201335 (2010)","journal-title":"Journal of Computer Security"},{"key":"18_CR5","unstructured":"Bergholz, A., Chang, J., Paa\u00df, G., Reichartz, F., Strobel, S.: Improved phishing detection using model-based features. In: Proc. Conf. on Email and Anti-Spam (CEAS) (2008)"},{"key":"18_CR6","unstructured":"Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing email detection based on structural properties. In: NYS CyberSecurity Conf. (2006)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proc. 16th int\u2019l conf. on World Wide Web, pp. 649\u2013656. ACM (2007)","DOI":"10.1145\/1242572.1242660"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-00958-7_40","volume-title":"Advances in Information Retrieval","author":"W.N. Gansterer","year":"2009","unstructured":"Gansterer, W.N., P\u00f6lz, D.: E-mail classification for phishing defense. In: Boughanem, M., Berrut, C., Mothe, J., Soule-Dupuy, C. (eds.) ECIR 2009. LNCS, vol.\u00a05478, pp. 449\u2013460. Springer, Heidelberg (2009)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.: A framework for detection and measurement of phishing attacks. In: Proc. 2007 ACM Workshop on Recurring Malcode, pp. 1\u20138 (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"18_CR10","unstructured":"Google- Webmaster Central Blog. Working with multilingual websites (2010)"},{"key":"18_CR11","unstructured":"Google Developers. Safe browsing api \u2013 google developers (2013)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J. Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Commun. ACM\u00a055(1), 74\u201381 (2012)","journal-title":"Commun. ACM"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Myers, S.: Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley-Interscience (2006)","DOI":"10.1002\/0470086106"},{"key":"18_CR14","unstructured":"James, L.: Phishing exposed. Syngress Publishing (2005)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-73614-1_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C. Ludl","year":"2007","unstructured":"Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol.\u00a04579, pp. 20\u201339. Springer, Heidelberg (2007)"},{"issue":"3","key":"18_CR16","first-page":"30","volume":"2","author":"J. Ma","year":"2011","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Learning to detect malicious urls. ACM TIST\u00a02(3), 30 (2011)","journal-title":"ACM TIST"},{"key":"18_CR17","unstructured":"McGrath, D.K., Gupta, M.: Behind phishing: An examination of phisher modi operandi. In: LEET (2008)"},{"key":"18_CR18","unstructured":"Netcraft. Netcraft extension - phishing protection and site reports (2014)"},{"key":"18_CR19","unstructured":"Netscape Communications Corporation. Open directory rdf dump (2004)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Ollmann, G.: The phishing guide. Next Generation Security Software Ltd. (2004)","DOI":"10.1016\/S1353-4858(04)00050-9"},{"key":"18_CR21","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Proc. 6th Conf. on Email and Anti-Spam (2009)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R.A., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: ACM Conference on Computer and Communications Security, pp. 635\u2013647 (2009)","DOI":"10.1145\/1653662.1653738"},{"key":"18_CR23","series-title":"LNCS","first-page":"455","volume-title":"ICISC 2013","author":"R. Verma","year":"2014","unstructured":"Verma, R., Hossain, N.: Semantic feature selection for text with application to automatic phishing email detection. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol.\u00a08565, pp. 455\u2013468. Springer, Heidelberg (2014)"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1007\/978-3-642-33167-1_47","volume-title":"Computer Security \u2013 ESORICS 2012","author":"R. Verma","year":"2012","unstructured":"Verma, R., Shashidhar, N., Hossain, N.: Detecting phishing emails the natural language way. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 824\u2013841. Springer, Heidelberg (2012)"},{"key":"18_CR25","unstructured":"Web of Trust. Safe browsing tool | wot (web of trust) (2014)"},{"key":"18_CR26","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: Proc. of 17th NDSS (2010)"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: Cantina+: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14, 21:1\u201321:28 (2011)","DOI":"10.1145\/2019599.2019606"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J.I.: A hybrid phish detection approach by identity discovery and keywords retrieval. In: Proceedings of the 18th International Conference on World Wide Web, pp. 571\u2013580. ACM (2009)","DOI":"10.1145\/1526709.1526786"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-15497-3_17","volume-title":"Computer Security \u2013 ESORICS 2010","author":"G. Xiang","year":"2010","unstructured":"Xiang, G., Pendleton, B.A., Hong, J., Rose, C.P.: A hierarchical adaptive probabilistic approach for zero hour phish detection. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 268\u2013285. Springer, Heidelberg (2010)"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Yu, W., Nargundkar, S., Tiruthani, N.: Phishcatch-a phishing detection tool. In: 33rd IEEE Int\u2019l Computer Software and Applications Conf., pp. 451\u2013456 (2009)","DOI":"10.1109\/COMPSAC.2009.175"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: Proc. 16th Int\u2019l Conf. on World Wide Web, pp. 639\u2013648. ACM (2007)","DOI":"10.1145\/1242572.1242659"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T12:04:03Z","timestamp":1690718643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}