{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:41:56Z","timestamp":1772905316898,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540736134","type":"print"},{"value":"9783540736141","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73614-1_2","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:09:45Z","timestamp":1189652985000},"page":"20-39","source":"Crossref","is-referenced-by-count":100,"title":["On the Effectiveness of Techniques to Detect Phishing Sites"],"prefix":"10.1007","author":[{"given":"Christian","family":"Ludl","sequence":"first","affiliation":[]},{"given":"Sean","family":"McAllister","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Firefox 2.0.0.1 Phishing Protection Bypass (2007), \n                    \n                      https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=367538"},{"key":"2_CR2","unstructured":"Anti-Phishing Working Group (APWG). APWG Homepage (2007), \n                    \n                      http:\/\/www.antiphishing.org\/"},{"key":"2_CR3","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.: Client-side defense against web-based identity theft. In: 11th Annual Network and Distributed System Security Symposium (NDSS 2004), San Diego (2005)"},{"key":"2_CR4","unstructured":"Utter, D.: Sites Want To Hook And Gut Phishers (2006), \n                    \n                      http:\/\/www.securitypronews.com\/insiderreports\/insider\/spn-49-20061114SitesWantToHookAndGutPhishers.html"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1073001.1073009","volume-title":"Proceedings of the 2005 symposium on Usable privacy and security","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: Dynamic security skins. In: Proceedings of the 2005 symposium on Usable privacy and security, pp. 77\u201388. ACM Press, New York (2005)"},{"key":"2_CR6","volume-title":"Proceedings of the Conference on Human Factors In Computing Systems (CHI) 2006","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why Phishing Works. In: Proceedings of the Conference on Human Factors In Computing Systems (CHI) 2006, Montreal, Canada, ACM Press, New York (2006)"},{"key":"2_CR7","unstructured":"eBay. eBay tool bar (2007), \n                    \n                      http:\/\/pages.ebay.com\/ebaytoolbar\/"},{"key":"2_CR8","unstructured":"Gartner Press Release. Gartner Says Number of Phishing E-Mails Sent to U.S. Adults Nearly Doubles in Just Two Years (2006), \n                    \n                      http:\/\/www.gartner.com\/it\/page.jsp?id=498245"},{"key":"2_CR9","unstructured":"Google. Google Toolbar for Firefox (2006), \n                    \n                      http:\/\/www.google.com\/tools\/firefox\/toolbar\/FT3\/intl\/en\/"},{"key":"2_CR10","unstructured":"Google. Google Whitelist (2007), \n                    \n                       http:\/\/sb.google.com\/safebrowsing\/update?version=goog-white-domain:1:-1"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C.: Protecting Users against Phishing Attacks. The Computer Journal\u00a0 (2006)","DOI":"10.1093\/comjnl\/bxh169"},{"key":"2_CR12","unstructured":"McAfee. McAfee SiteAdvisor (2007), \n                    \n                      http:\/\/www.siteadvisor.com"},{"key":"2_CR13","unstructured":"Sutton, M.: A Tour of the Google Blacklist (2007), \n                    \n                      http:\/\/portal.spidynamics.com\/blogs\/msutton\/archive\/2007\/01\/04\/A-Tour-of-theGoogle-Blacklist.aspx"},{"key":"2_CR14","unstructured":"Microsoft. Microsoft Internet Explorer Privacy Statement (2006), \n                    \n                      http:\/\/www.microsoft.com\/windows\/ie\/ie7\/privacy\/ieprivacy_7.mspx"},{"key":"2_CR15","unstructured":"Microsoft. Phishing Filter FAQ (2007), \n                    \n                      https:\/\/phishingfilter.microsoft.com\/faq.aspx"},{"key":"2_CR16","unstructured":"Microsoft. Sender ID Home Page (2007), \n                    \n                      http:\/\/www.microsoft.com\/mscorp\/safety\/technologies\/senderid\/default.mspx"},{"key":"2_CR17","unstructured":"Mozilla. Firefox 2 Phishing Protection Effectiveness Testing (2006), \n                    \n                      http:\/\/www.mozilla.org\/security\/phishing-test.html"},{"key":"2_CR18","unstructured":"NetCraft. Netcraft anti-phishing tool bar (2007), \n                    \n                      http:\/\/toolbar.netcraft.com"},{"key":"2_CR19","unstructured":"Robichaux, P., Phishing, G.: Evaluating Anti-Phishing Tools for Windows (2006), \n                    \n                      http:\/\/www.3sharp.com\/projects\/antiphishing\/gone-phishing.pdf"},{"key":"2_CR20","unstructured":"Phishtank. Phishtank feed: validated and online (2007) \n                    \n                      http:\/\/data.phishtank.com\/data\/online-valid\/index.xml"},{"key":"2_CR21","unstructured":"Provos, N.: Phishing Protection: Server Spec: Lookup Requests (2007) \n                    \n                       http:\/\/wiki.mozilla.org\/Phishing_Protection:_Server_Spec#Lookup_Requests"},{"key":"2_CR22","volume-title":"C4.5: Programs for Machine Learning","author":"R. Quinlan","year":"1993","unstructured":"Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"2_CR23","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: A Browser Plug-In Solution to the Unique Password Problem (2005), \n                    \n                      http:\/\/crypto.stanford.edu\/PwdHash\/"},{"key":"2_CR24","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger Password Authentication Using Browser Extensions. In: 14th Usenix Security Symposium (2005)"},{"key":"2_CR25","unstructured":"Schneider, F., Provos, N., Moll, R., Chew, M., Rakowski, B.: Phishing Protection Design Documentation (2007), \n                    \n                      http:\/\/wiki.mozilla.org\/Phishing_Protection:_Design_Documentation"},{"key":"2_CR26","unstructured":"SpoofGuard. Client-side defense against web-based identity theft (2005), \n                    \n                      http:\/\/crypto.stanford.edu\/SpoofGuard\/"},{"key":"2_CR27","unstructured":"Sharif, T.: IE Blog: Phishing Filter (2005), \n                    \n                      http:\/\/blogs.msdn.com\/ie\/archive\/2005\/09\/09\/463204.aspx"},{"key":"2_CR28","unstructured":"Verisign. Anti-Phishing Solution (2005), \n                    \n                      http:\/\/www.verisign.com\/verisign-business-solutions\/anti-phishing-solut%ions\/"},{"key":"2_CR29","unstructured":"W3C. IEBlog:IE7 Phishing Filter Performance Update is Now Available (2007), \n                    \n                      http:\/\/blogs.msdn.com\/ie\/archive\/2007\/01\/31\/ie7-phishing-filter-perform%ance-update-is-now-available.aspx"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Wenyin, L., Huang, G., Xiaoyue, L., Min, Z., Deng, X.: Detection of phishing webpages based on visual similarity. In: 14th International Conference on World Wide Web (WWW): Special Interest Tracks and Posters (2005)","DOI":"10.1145\/1062745.1062868"},{"key":"2_CR31","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"key":"2_CR32","unstructured":"Yahoo. Yahoo! AntiSpam Resource Center (2007), \n                    \n                      http:\/\/antispam.yahoo.com\/domainkeys"},{"key":"2_CR33","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: Evaluating Anti-Phishing Tools. In: Network and IT Security Conference: NDSS 2007, San Diego, California (2007)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73614-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T14:29:16Z","timestamp":1550932156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73614-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540736134","9783540736141"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73614-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}