{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:09:44Z","timestamp":1725491384814},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752479"},{"type":"electronic","value":"9783540752486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75248-6_13","type":"book-chapter","created":{"date-parts":[[2007,9,5]],"date-time":"2007-09-05T15:20:40Z","timestamp":1189005640000},"page":"181-192","source":"Crossref","is-referenced-by-count":3,"title":["An Intrusion Detection System for Detecting Phishing Attacks"],"prefix":"10.1007","author":[{"given":"Hasika","family":"Pamunuwa","sequence":"first","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"The Anti-Phishing Working Group (APWG): http:\/\/www.antiphishing.org","key":"13_CR1"},{"unstructured":"Financial Service Technology Consortium (FSTC): North-America based financial institutions, technology vendors, independent research organizations and government agency, available at: http:\/\/www.fstc.org\/projects\/docs\/FSTC_Counter_Phishing_Project_Whitepaper.pdf","key":"13_CR2"},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., Ma, W.-Y., Zhang, H.-J.: Detecting Web Page Structure for Adaptive Viewing on Small Form Factor Devices. In: WWW 2003 (May 20-24, 2003)","key":"13_CR3","DOI":"10.1145\/775152.775184"},{"doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Thomasic, A.: Learning to Detect Phishing Emails. WWW ( to appear, 2007), available at: http:\/\/www.cs.cmu.edu\/~tomasic\/doc\/2007\/FetteSadehTomasicWWW2007.pdf","key":"13_CR4","DOI":"10.21236\/ADA456046"},{"unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-side defense against web-based identity theft (Webspoof), available at: http:\/\/www.crypto.stanford.edu\/SpoofGuard\/webspoof.pdf","key":"13_CR5"},{"unstructured":"Provos, N.: A Virtual Honeypot Framework. available at: http:\/\/www.niels.xtdnet.nl\/papers\/honeyd.pdf","key":"13_CR6"},{"key":"13_CR7","volume-title":"international infrastructure survivability workshop (IISW 2004) 2004, held in conjunction with the 25th IEEE International Real-time systems symposium (RTSS 2004)","author":"N. Vanderavero","year":"2004","unstructured":"Vanderavero, N., Brouckaert, X., Bonaventure, O., Charlier, B.L.: The HoneyTank.: A Scalable Approach to collect malicious Internet Traffic. In: international infrastructure survivability workshop (IISW 2004) 2004, held in conjunction with the 25th IEEE International Real-time systems symposium (RTSS 2004), IEEE Computer Society Press, Los Alamitos (2004), Paper available at http:\/\/www.info.ucl.ac.be\/people\/OBO\/papers\/honeytank.pdf"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J., Cranor, L.: CANTINA: A Content Based Approach to Detecting Phishing Sites. WWW (to appear, 2007), available at www.cups.cs.cmu.edu\/trust.php","key":"13_CR8","DOI":"10.1145\/1242572.1242659"},{"doi-asserted-by":"crossref","unstructured":"Wenyin, L., Huang, G., Xiaoyue, L., Min, Z., Deng, X.: Detection of Phishing Webpages based on Visual Similarity. WWW (May 10-14, 2005) Chiba, Japan (2005)","key":"13_CR9","DOI":"10.1145\/1062745.1062868"},{"unstructured":"Cordero, A., Blain, T.: Catching Phish: Detecting Phishing Attacks From Rendered website Images. available at: http:\/\/www.cs.berkeley.edu\/~asimma\/294-fall06\/projects\/reports\/cordero.pdf","key":"13_CR10"},{"unstructured":"RSS Feeds. available at: http:\/\/en.wikipedia.org\/","key":"13_CR11"},{"unstructured":"The Wdiff tool. available at: http:\/\/www.gnu.org\/software\/wdiff\/wdiff.html","key":"13_CR12"},{"unstructured":"An HTML parser. available at: http:\/\/htmlparser.sourceforge.net\/","key":"13_CR13"},{"unstructured":"The Apache SpamAssassin Project. available at: http:\/\/spamassassin.apache.org\/","key":"13_CR14"},{"unstructured":"Apple Mac OS X Safari Browser. available at: http:\/\/www.apple.com\/macosx\/features\/safari\/","key":"13_CR15"},{"unstructured":"Safari Cocoa Plugin. Available at: http:\/\/developer.apple.com\/internet\/safari\/","key":"13_CR16"},{"unstructured":"GNU Octave. Available at: http:\/\/www.gnu.org\/software\/octave\/","key":"13_CR17"},{"unstructured":"ImageMagick. Available at: http:\/\/www.imagemagick.org\/script\/index.php","key":"13_CR18"},{"unstructured":"The Darknet Project. Available at: http:\/\/www.cymru.com\/Darknet\/","key":"13_CR19"},{"unstructured":"The R-Project. Available at: http:\/\/www.r-project.org\/","key":"13_CR20"},{"unstructured":"Lucene Nutch. http:\/\/www.lucene.apache.org\/nutch","key":"13_CR21"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75248-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:57:02Z","timestamp":1619521022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75248-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752479","9783540752486"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75248-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}