{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:15:04Z","timestamp":1774880104555,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319763477","type":"print"},{"value":"9783319763484","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_59","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T11:10:42Z","timestamp":1521630642000},"page":"608-618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["NLP Based Phishing Attack Detection from URLs"],"prefix":"10.1007","author":[{"given":"Ebubekir","family":"Buber","sequence":"first","affiliation":[]},{"given":"Banu","family":"Diri","sequence":"additional","affiliation":[]},{"given":"Ozgur Koray","family":"Sahingoz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"59_CR1","unstructured":"Anti-Phishing Working Group (APWG): Phishing activity trends report\u2014last quarter (2016). \nhttp:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2016.pdf"},{"issue":"4","key":"59_CR2","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. 1\u20138. ACM, November 2007","DOI":"10.1145\/1314389.1314391"},{"issue":"12","key":"59_CR4","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2007.437","volume":"40","author":"A Stone","year":"2007","unstructured":"Stone, A.: Natural-language processing for intrusion detection. Computer 40(12), 103\u2013105 (2007)","journal-title":"Computer"},{"issue":"4","key":"59_CR5","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"AY Fu","year":"2006","unstructured":"Fu, A.Y., Wenyin, L., Deng, X.: Detecting phishing web pages with visual similarity assessment based on earth mover\u2019s distance (EMD). IEEE Trans. Dependable Secur. Comput. 3(4), 301\u2013311 (2006)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Toolan, F., Carthy, J.: Phishing detection using classifier ensembles. In: 2009 eCrime Researchers Summit, eCRIME 2009, pp. 1\u20139 (2009)","DOI":"10.1109\/ECRIME.2009.5342607"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, eCrime 2007, pp. 60\u201369. ACM, New York (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Cook, D.L., Gurbani, V.K., Daniluk, M.: Phishwish: a stateless phishing filter using minimal rules. In: Financial Cryptography and Data Security, pp. 182\u2013186. Springer (2008)","DOI":"10.1007\/978-3-540-85230-8_15"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Cao, Y., Han, W., Le, Y.: Anti-phishing based on automated individual white-list. In: DIM 2008: 4th ACM Workshop on Digital Identity Management, New York, pp. 51\u201360 (2008)","DOI":"10.1145\/1456424.1456434"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Sahingoz, O.K., Erdogan, N.: RUBDES: a rule based distributed event system. In: 18th International Symposium on Computer and Information Sciences - ISCIS 2003, Antalya, Turkey, pp. 284\u2013291 (2003)","DOI":"10.1007\/978-3-540-39737-3_36"},{"key":"59_CR11","unstructured":"Phistank: join the fight against phishing. \nhttps:\/\/www.phishtank.com\/developer_info.php\n\n. Accessed Oct 2017"},{"key":"59_CR12","unstructured":"Yandex account: Yandex Technologies. \nhttps:\/\/tech.yandex.com.tr\/xml\/\n\n. Accessed Oct 2017"},{"key":"59_CR13","unstructured":"PyEnchant\u2014PyEnchant v1.6.6 documentation. \nhttp:\/\/pyenchant.readthedocs.io\/en\/latest\/index.html\n\n. Accessed Oct 2017"},{"key":"59_CR14","unstructured":"A small program to detect gibberish using a Markov chain. \nhttps:\/\/github.com\/rrenaud\/Gibberish-Detector\n\n. Accessed Oct 2017"},{"key":"59_CR15","unstructured":"Weka 3: data mining software in Java. \nhttp:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n\n. Accessed Oct 2017"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Buber, E., Diri, B., Sahingoz, O.K.: Detecting phishing attacks from URL by using NLP techniques. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, pp. 337\u2013342 (2017)","DOI":"10.1109\/UBMK.2017.8093406"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T11:47:44Z","timestamp":1521632864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}