{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:57:15Z","timestamp":1725533835219},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026263"},{"type":"electronic","value":"9783642026270"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02627-0_20","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T09:05:54Z","timestamp":1245315954000},"page":"195-198","source":"Crossref","is-referenced-by-count":0,"title":["Scalable Detection and Isolation of Phishing"],"prefix":"10.1007","author":[{"given":"Giovane C. M.","family":"Moura","sequence":"first","affiliation":[]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Herley, C., Florencio, D.: A profitless endeavor: Phishing as tragedy of the commons. In: Proc. of the ACM SIGSAC New Security Paradigms Workshop, Lake Tahoe, California, USA (September 2008)","DOI":"10.1145\/1595676.1595686"},{"key":"20_CR2","unstructured":"McCall, T.: Gartner survey shows phishing attacks escalated in 2007 (2008)"},{"key":"20_CR3","first-page":"581","volume-title":"CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 581\u2013590. ACM, New York (2006)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Lessons from a real world evaluation of anti-phishing training. In: eCrime Researchers Summit, pp. 1\u201312 (2008)","DOI":"10.1109\/ECRIME.2008.4696970"},{"key":"20_CR5","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1145\/1242572.1242660","volume-title":"WWW 2007: Proceedings of the 16th international conference on World Wide Web","author":"I. Fette","year":"2007","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: WWW 2007: Proceedings of the 16th international conference on World Wide Web, pp. 649\u2013656. ACM, New York (2007)"},{"key":"20_CR6","unstructured":"Zhang, Y., Egelman, S., Cranor, L.F., Hong, J.: Phinding phish: Evaluating anti-phishing tools. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, USA (2007)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1073001.1073009","volume-title":"SOUPS 2005: Proceedings of the 2005 symposium on Usable privacy and security","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: Dynamic security skins. In: SOUPS 2005: Proceedings of the 2005 symposium on Usable privacy and security, pp. 77\u201388. ACM, New York (2005)"},{"key":"20_CR8","unstructured":"Phishing Protection\u00a0Design Documentation (2009), https:\/\/wiki.mozilla.org\/safe_browsing:_design_documentation"},{"key":"20_CR9","unstructured":"Cyveillance Anti-Phishing (2009), http:\/\/www.cyveillance.com\/"},{"key":"20_CR10","unstructured":"British Telecom Managed\u00a0Security Services (2009), http:\/\/bt.counterpane.com\/managed-security-services.html"},{"key":"20_CR11","first-page":"147","volume-title":"VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security","author":"B. Irwin","year":"2007","unstructured":"Irwin, B., Pilkington, N.: High level internet scale traffic visualization using hilbert curve mapping. In: VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, pp. 147\u2013158. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Scalability of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02627-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:43:49Z","timestamp":1633617829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02627-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026263","9783642026270"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02627-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}