{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:41:45Z","timestamp":1772905305504,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319259147","type":"print"},{"value":"9783319259154","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25915-4_15","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T09:43:45Z","timestamp":1451382225000},"page":"278-293","source":"Crossref","is-referenced-by-count":7,"title":["Browser Blacklists: The Utopia of Phishing Protection"],"prefix":"10.1007","author":[{"given":"N.","family":"Tsalis","sequence":"first","affiliation":[]},{"given":"N.","family":"Virvilis","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mylonas","sequence":"additional","affiliation":[]},{"given":"T.","family":"Apostolopoulos","sequence":"additional","affiliation":[]},{"given":"D.","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Virvilis N., Tsalis N., Mylonas A., Gritzalis D.: Mobile devices: a phisher\u2019s paradise. In: 11th International Conference on Security and Cryptography (SECRYPT-2014), pp. 79\u201387. ScitePress, Austria (2014)","DOI":"10.5220\/0005045000790087"},{"key":"15_CR2","unstructured":"Gartner: Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in 3rd Quarter of 2013. https:\/\/www.gartner.com\/newsroom\/id\/2623415"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Mylonas A., Dritsas S, Tsoumas V., Gritzalis D.: Smartphone security evaluation - the malware attack case. In: 8th International Conference on Security and Cryptography, pp. 25\u201336. SciTePress, Spain, July 2011","DOI":"10.5220\/0003446800250036"},{"key":"15_CR4","unstructured":"Gartner: Gartner Says Worldwide Mobile Payment Transaction Value to Surpass $235 Bil-lion in 2013. https:\/\/www.gartner.com\/newsroom\/id\/2504915"},{"key":"15_CR5","unstructured":"Capaccio, N.: Apple Mobile Devices Cleared for Use on U.S. Military Networks. http:\/\/www.bloomberg.com\/news\/2013-05-17\/apple-mobile-devices-cleared-for-use-on-u-s-military-networks.html"},{"key":"15_CR6","unstructured":"CBC: Smartphones becoming prime target for criminal hackers. http:\/\/www.cbc.ca\/news\/technology\/smartphones-becoming-prime-target-for-criminal-hackers-1.2561126"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Mell, P., Kent, K., Nusbaum, J.: Guide to malware incident prevention and handling, National Institute of Standards and Technology (NIST) (2005)","DOI":"10.6028\/NIST.SP.800-83"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Virvilis N., Gritzalis D.: Trusted Computing vs. advanced persistent threats: can a defender win this game?. In: 10th IEEE International Conference on Autonomic and Trusted Compu-ting, pp. 396\u2013403. IEEE Press, Italy (2013)","DOI":"10.1109\/UIC-ATC.2013.80"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Virvilis N., Gritzalis D.: The big four - what we did wrong in advanced persistent threat detection?. In: 8th International Conference on Availability, Reliability and Security, pp. 248\u2013254. IEEE, Germany (2013)","DOI":"10.1109\/ARES.2013.32"},{"key":"15_CR10","unstructured":"Google: Safe Browsing API. https:\/\/developers.google.com\/safe-browsing\/"},{"key":"15_CR11","unstructured":"Microsoft: SmartScreen Filter. http:\/\/windows.microsoft.com\/en-us\/internet-explorer\/products\/ie-9\/features\/smartscreen-filter"},{"key":"15_CR12","unstructured":"Netcraft: Phishing Site Feed. http:\/\/www.netcraft.com\/anti-phishing\/phishing-site-feed\/"},{"key":"15_CR13","unstructured":"PhishTank: Join the fight against phishing. https:\/\/www.phishtank.com\/"},{"key":"15_CR14","unstructured":"Abrams R., Barrera O., Pathak J.: Browser Security Comparative Analysis, NSS Labs (2013). https:\/\/www.nsslabs.com\/reports\/browser-security-comparative-analysis-phishing-protection"},{"issue":"6","key":"15_CR15","first-page":"783","volume":"4","author":"MN Banu","year":"2013","unstructured":"Banu, M.N., Munawara Banu, S.: A comprehensive study of phishing attacks. Int. J. Comput. Sci. Inf. Technol. 4(6), 783\u2013786 (2013)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Rosiello, A.P., Kirda, E., Kruegel, C., Ferrandi, F.: A layout-similarity-based approach for detecting phishing pages. In: Security and Privacy in Communications Networks Workshops, pp. 454\u2013463 (2007)","DOI":"10.1109\/SECCOM.2007.4550367"},{"issue":"10","key":"15_CR17","first-page":"42","volume":"88","author":"S Rani","year":"2014","unstructured":"Rani, S., Dubey, J.: A survey on phishing attacks. Int. J. Comput. Appl. 88(10), 42 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR18","unstructured":"Jansson, K., Von Solms, R.: Phishing for phishing awareness. In: Behavior & Information Technology Conference, vol. 32, no. 6, pp. 584\u2013593 (2013)"},{"key":"15_CR19","unstructured":"Bian R.M.: Alice in Battlefield: An Evaluation of the Effectiveness of Various UI Phishing Warnings, https:\/\/www.cs.auckland.ac.nz\/courses\/compsci725s2c\/archive\/termpapers\/725mbian13.pdf"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Darwish A., Bataineh E.: Eye tracking analysis of browser security indicators. In: Computer Systems and Industrial Informatics Conference, pp. 1\u20136 (2012)","DOI":"10.1109\/ICCSII.2012.6454330"},{"key":"15_CR21","unstructured":"Akhawe D., Felt A.P.: Alice in Warningland: A large-scale field study of browser security warning effectiveness. In: 22nd USENIX Security Symposium (2013)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-39884-1_5","volume-title":"Financial Cryptography and Data Security","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Schechter, S.: The importance of being earnest [in security warnings]. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 52\u201359. Springer, Heidelberg (2013)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Egelman S., Cranor L., Hong J.: You\u2019ve been warned: an empirical study of the ef-fectiveness of web browser phishing warnings. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074 (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"15_CR24","unstructured":"Sheng S., Wardman B., Warner G., Cranor L. Hong J., Zhang C.: An empirical analysis of phishing blacklists. In: 6th Conference on Email and Anti-Spam (2009)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Kirda E., Kruegel C.: Protecting users against phishing attacks with antiphish. In: Computer Software and Applications Conference, vol. 1, pp. 517\u2013524 (2005)","DOI":"10.1109\/COMPSAC.2005.126"},{"issue":"10","key":"15_CR26","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TNN.2011.2161999","volume":"22","author":"H Zhang","year":"2011","unstructured":"Zhang, H., Liu, G., Chow, T.W., Liu, W.: Textual and visual content-based anti-phishing: A Bayesian approach. IEEE Trans. Neural Netw. 22(10), 1532\u20131546 (2011)","journal-title":"IEEE Trans. Neural Netw."}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25915-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T23:26:54Z","timestamp":1748734014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25915-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259147","9783319259154"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25915-4_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}