{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:48:52Z","timestamp":1769831332363,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642024894","type":"print"},{"value":"9783642024900","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02490-0_66","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T06:08:21Z","timestamp":1248934101000},"page":"539-546","source":"Crossref","is-referenced-by-count":39,"title":["An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Hiroaki","family":"Hazeyama","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","unstructured":"Anti-Phishing Working Group: Phishing Activity Trends Report (July 2007)"},{"key":"66_CR2","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: Evaluating Anti-Phishing Tools. In: Proceesings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007) (2007)"},{"key":"66_CR3","unstructured":"Kumar, A.: Phishing - A new age weapon. Technical report, Open Web Application Secuirtry Project (OWASP) (2005)"},{"key":"66_CR4","unstructured":"Tally, G., Thomas, R., Vleck, T.V.: Anti-Phishing: Best Practices for Institutions and Consumers. Technical report, McAfee Research (2004)"},{"key":"66_CR5","unstructured":"Van der Merwe, A., Loock, M., Dabrowski, M.: Characteristics and responsibilities involeved in a phishing attack. In: Proceedings of the 4th International Symposium on Information and Communication Technologies (ISICT 2005) (2005)"},{"key":"66_CR6","unstructured":"Miyamoto, D., Hazeyama, H., Kadobayashi, Y.: A Proposal of the AdaBoost-Based Detection of Phishing Sites. In: Proceedings of the 2nd Joint Workshop on Information security (2007)"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J., Cranor, L.: CANTINA: A Content-Based Approach to Detect Phishing Web Sites. In: Proceesings of the 16th World Wide Web Conference (WWW 2007) (2007)","DOI":"10.1145\/1242572.1242659"},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N.M., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th International Conference on World Wide Web (WWW 2007) (2007)","DOI":"10.1145\/1242572.1242660"},{"key":"66_CR9","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Proceedings of eCrime Researchers Summit (eCryme 2007) (2007)","DOI":"10.1145\/1299015.1299021"},{"key":"66_CR10","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-540-77465-5_19","volume":"226","author":"R. Basnet","year":"2008","unstructured":"Basnet, R., Mukkamala, S., Sung, A.H.: Detection of phishing attacks: A machine learning approach. Studies in Fuzziness and Soft Computing\u00a0226, 373\u2013383 (2008)","journal-title":"Studies in Fuzziness and Soft Computing"},{"key":"66_CR11","doi-asserted-by":"crossref","unstructured":"Pan, Y., Ding, X.: Anomaly based web phishing page detection. In: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC 2006) (2006)","DOI":"10.1109\/ACSAC.2006.13"},{"key":"66_CR12","unstructured":"OpenDNS: PhishTank - Join the fight against phishing, \n                    \n                      http:\/\/www.phishtank.com"},{"key":"66_CR13","unstructured":"Robichaux, P., Ganger, D.L.: Gone Phishing: Evaluating Anti-Phishing Tools for Windows, \n                    \n                      http:\/\/www.3sharp.com\/projects\/antiphishing\/gone-phishing.pdf"},{"key":"66_CR14","unstructured":"Alexa Internet, Inc.: Alexa the Web Information Company, \n                    \n                      http:\/\/www.alexa.com"},{"key":"66_CR15","unstructured":"Yahoo!Inc.: Random Yahoo Link, \n                    \n                      http:\/\/random.yahoo.com\/fast\/ryl"}],"container-title":["Lecture Notes in Computer Science","Advances in Neuro-Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02490-0_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:08:36Z","timestamp":1558267716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02490-0_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024894","9783642024900"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02490-0_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}