{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:44Z","timestamp":1759092464995,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_25","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"461-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Solution to Detect Phishing in Android Devices"],"prefix":"10.1007","author":[{"given":"Sharvari Prakash","family":"Chorghe","sequence":"first","affiliation":[]},{"given":"Narendra","family":"Shekokar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"25_CR1","unstructured":"Android. https:\/\/www.android.com\/"},{"key":"25_CR2","unstructured":"Phishing. https:\/\/en.wikipedia.org\/wiki\/Phishing"},{"key":"25_CR3","unstructured":"Anti Phishing Working Group (APWG). http:\/\/www.antiphishing.org\/"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Nguyen, L.A.T., et al.: Detecting phishing web sites: a heuristic URL-based approach. In: 2013 International Conference on Advanced Technologies for Communications (ATC 2013). IEEE (2013)","DOI":"10.1109\/ATC.2013.6698185"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Shelly, D.: Goldphish: using images for content-based phishing analysis. In: 2010 Fifth International Conference on Internet Monitoring and Protection (ICIMP). IEEE (2010)","DOI":"10.1109\/ICIMP.2010.24"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Basnet, R.B., Doleck, T.: Towards developing a tool to detect phishing URLs: a machine learning approach. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT). IEEE (2015)","DOI":"10.1109\/CICT.2015.63"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress). IEEE (2015)","DOI":"10.1109\/BigDataCongress.2015.97"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Chang, E.H., Chiew, K.L., Tiong, W.K.: Phishing detection via identification of website identity. In: 2013 International Conference on IT Convergence and Security (ICITCS). IEEE (2013)","DOI":"10.1109\/ICITCS.2013.6717870"},{"key":"25_CR9","unstructured":"Geng, G.-G., et al.: Favicon-a clue to phishing sites detection. eCrime Researchers Summit (eCRS). IEEE (2013)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Wu, L., Du, X., Wu, J.: MobiFish: a lightweight anti-phishing scheme for mobile phones. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE (2014)","DOI":"10.1109\/ICCCN.2014.6911743"},{"key":"25_CR11","unstructured":"PhishTank. http:\/\/www.phishtank.com\/what_is_phishing"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Bottazzi, G., et al.: MP-Shield: a framework for phishing detection in mobile devices. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM). IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.293"},{"issue":"3","key":"25_CR13","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1049\/iet-ifs.2013.0202","volume":"8","author":"RM Mohammad","year":"2014","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8(3), 153\u2013160 (2014)","journal-title":"IET Inf. Secur."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, S., Argles, D.: An anti-phishing mechanism for single sign-on based on QR-code. In: 2011 International Conference on Information Society (i-Society). IEEE (2011)","DOI":"10.1109\/i-Society18435.2011.5978554"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Han, W., Wang, Y., Cao, Y., Zhou, J., Wang, L.: Anti-phishing by smart mobile device. In: IFIP International Conference on Network and Parallel Computing - Workshops (2007)","DOI":"10.1109\/NPC.2007.68"},{"key":"25_CR16","first-page":"1759","volume":"2","author":"KP Vibhuti","year":"2014","unstructured":"Vibhuti, K.P., et al.: Safe internet browsing using heuristic based technique. Int. J. Eng. Dev. Res. 2, 1759\u20131766 (2014)","journal-title":"Int. J. Eng. Dev. Res."},{"issue":"1","key":"25_CR17","first-page":"36","volume":"13","author":"AT Siddiqui","year":"2012","unstructured":"Siddiqui, A.T., Zamani, A.S., Ahmed, J.: Android security model that provide a base operating system. J. Telecommun. 13(1), 36\u201343 (2012)","journal-title":"J. Telecommun."},{"key":"25_CR18","unstructured":"PhishTank. What is Phishing? http:\/\/www.phishtank.com\/what_is_phishing"},{"key":"25_CR19","unstructured":"Wikepedia. Accuracy and Precision. https:\/\/en.wikipedia.org\/wiki\/Accuracy_and_precision"},{"key":"25_CR20","unstructured":"Shaikh, J.S.: Facebook Phishing, 15 August 2015. https:\/\/linuxworkgroup.wordpress.com\/2015\/08\/25\/facebook-phishing\/"},{"issue":"1","key":"25_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.aci.2014.07.002","volume":"11","author":"N Abdelhamid","year":"2015","unstructured":"Abdelhamid, N.: Multi-label rules for phishing classification. Appl. Comput. Inform. 11(1), 29\u201346 (2015)","journal-title":"Appl. Comput. Inform."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T13:09:15Z","timestamp":1601212155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}