{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T23:10:02Z","timestamp":1749683402297,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_15","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"156-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Phishing Webpage Detecting Algorithm Using Webpage Noise and N-Gram"],"prefix":"10.1007","author":[{"given":"Qiong","family":"Deng","sequence":"first","affiliation":[]},{"given":"Huajun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liangmin","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Jiaohua","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"15_CR1","unstructured":"APWG. http:\/\/www.antiphishing.org . Accessed 3 Mar 2015"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Commun. ACM 55(1), 74\u201381 (2012)","journal-title":"Commun. ACM"},{"key":"15_CR3","unstructured":"APAC. http:\/\/www.apac.org.cn\/ . Accessed 3 Mar 2016"},{"key":"15_CR4","unstructured":"APAC. http:\/\/www.apac.org.cn\/gzdt\/qwfb\/201602\/P020160225393465225017.pdf . Accessed 3 Mar 2016"},{"issue":"3","key":"15_CR5","doi-asserted-by":"crossref","first-page":"435","DOI":"10.2307\/25750686","volume":"34","author":"A Abbasi","year":"2010","unstructured":"Abbasi, A., Zhang, Z., Zimbra, D., et al.: Detecting fake websites: the contribution of statisitical learning theory. MIS Q. 34(3), 435\u2013461 (2010)","journal-title":"MIS Q."},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"921","DOI":"10.3923\/itj.2012.921.925","volume":"11","author":"HJ Huang","year":"2012","unstructured":"Huang, H.J., Qian, L., Wang, Y.J.: A SVM-based technique to detect phishing URLs. Inf. Technol. J. 11(2), 921\u2013925 (2012)","journal-title":"Inf. Technol. J."},{"issue":"7","key":"15_CR7","first-page":"6","volume":"11","author":"C Yue","year":"2010","unstructured":"Yue, C., Wang, H.N.: BogusBiter: a transparent protection against phishing attacks. ACM Trans. Internet Technol. 11(7), 6\u201336 (2010)","journal-title":"ACM Trans. Internet Technol."},{"issue":"10","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TNN.2011.2161999","volume":"22","author":"H Zhang","year":"2011","unstructured":"Zhang, H., Liu, G., Chow, T.W.S., et al.: Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Trans. Neural Netw. 22(10), 1532\u20131546 (2011)","journal-title":"IEEE Trans. Neural Netw."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Huang, C., Ma, S., Yeh, W.: Mitigate web phishing using site signatures. In: Proceedings of TENCON 2010, pp. 803\u2013808. IEEE (2010)","DOI":"10.1109\/TENCON.2010.5686582"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3923\/itj.2013.198.203","volume":"12","author":"HJ Huang","year":"2013","unstructured":"Huang, H.J., Wang, Y.J., Xie, L.L., et al.: An active anti-phishing solution based on semi-fragile watermark. Inf. Technol. J. 12(1), 198\u2013203 (2013)","journal-title":"Inf. Technol. J."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Wardman, B., Stallings, T., Warner, G., Skjellum, A.: Automating phishing website identification through deep MD5 matching. In: eCrime Researchers Summit, pp. 1\u20137 (2008)","DOI":"10.1109\/ECRIME.2008.4696972"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Shelly, D: GoldPhish: using images for content-based phishing analysis. In: Proceedings of the Fifth International Conference on Internet Monitoring and Protection, pp. 123\u2013128. IEEE (2010)","DOI":"10.1109\/ICIMP.2010.24"},{"key":"15_CR13","unstructured":"Whittaker, C., Ryner, B., Nazif, M: Large-scale automatic classification of phishing pages. In: Network and Distributed Systems Security Symposium, pp. 1\u201310 (2010)"},{"issue":"7","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. (2016). doi: 10.1109\/TNNLS.2016.2544779","DOI":"10.1109\/TNNLS.2016.2544779"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"G Bin","year":"2015","unstructured":"Bin, G., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for \u03bd-support vector regression. Neural Netw. 67, 140\u2013150 (2015)","journal-title":"Neural Netw."},{"issue":"12","key":"15_CR17","first-page":"2025","volume":"47","author":"XL Mao","year":"2010","unstructured":"Mao, X.L., He, J., Yan, H.F.: A survey of web page cleaning research. J. Comput. Res. Dev. 47(12), 2025\u20132036 (2010)","journal-title":"J. Comput. Res. Dev."},{"key":"15_CR18","unstructured":"Phishtank. http:\/\/www.phishtank.com\/ . Accessed 3 Mar 2015"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T22:37:11Z","timestamp":1749681431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}