{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:17:56Z","timestamp":1775283476425,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642041167","type":"print"},{"value":"9783642041174","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_23","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"433-448","source":"Crossref","is-referenced-by-count":54,"title":["Phishing Attacks and Countermeasures"],"prefix":"10.1007","author":[{"given":"Zulfikar","family":"Ramzan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Symantec, Inc.: Internet security threat report volume XIII (April 2008)"},{"key":"23_CR2","unstructured":"Z.\u00a0Ramzan, C.\u00a0Wueest: Phishing attacks: analyzing trends in 2006, Conference on Email and Anti-Spam (August 2007)"},{"key":"23_CR3","unstructured":"Symantec, Inc.: Symantec report on the underground economy (November 2008), available at http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport"},{"key":"23_CR4","unstructured":"C. Wueest: Personal communication (2008)"},{"key":"23_CR5","volume-title":"Crimeware: Understanding New Attacks and Defenses","author":"M. Jakobsson","year":"2008","unstructured":"M.\u00a0Jakobsson, Z.\u00a0Ramzan: Crimeware: Understanding New Attacks and Defenses (Addison Wesley, Boston, MA 2008)"},{"key":"23_CR6","unstructured":"M.\u00a0Jakobsson, A.\u00a0Juels, T.\u00a0Jagatic: Cache cookies for browser authentication \u2013 extended abstract, IEEE S&P\u201906 (2006)"},{"issue":"10","key":"23_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T. Jagatic","year":"2007","unstructured":"T. Jagatic, N. Johnson, M. Jakobsson, F. Menczer: Social phishing, Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"23_CR8","unstructured":"O. Whitehouse: SMS\/MMS: The new frontier for spam and phishing, Symantec Security Response Blog (14 July 2006), available at http:\/\/www.symantec.com\/enterprise\/security_response\/weblog\/2006\/07\/sms mms_one_of_the_next_frontie.html"},{"key":"23_CR9","unstructured":"Honeynet Project: Know your enemies: fast flux service networks (July 2007), available at http:\/\/www.honeynet.org\/papers\/ff\/fast-flux.html"},{"key":"23_CR10","unstructured":"G. Aaron, D. Alperovitch, L. Mather: The relationship of phishing and domain tasting, report and analysis by APWG DNS Policy Working Group"},{"key":"23_CR11","unstructured":"S\/MIME Working Group: http:\/\/www.imc.org\/ietf-smime\/"},{"key":"23_CR12","unstructured":"E. Allman, J. Callas, M. Delaney, M. Libbey, J. Fenton, M. Thomas: Domain keys identified mail, IETF Internet Draft (2005)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"M.\u00a0Wu, R.\u00a0Miller, S.L.\u00a0Garfinkel: Do security toolbars actually prevent phishing attacks?, Conference on Human Factors in Computing Systems (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"S.\u00a0Schechter, R.\u00a0Dhamija, A.\u00a0Ozment, I.\u00a0Fischer: The emperor\u2019s new security indicators: an evaluation of website authentication and the effect of role playing on usability studies, IEEE Symposium on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.35"},{"key":"23_CR15","unstructured":"A. Sotirov, M. Stevens, J. Appelbaum, A. Lenstra, D. Molnar, D.A. Osvik, B. de Weger: MD5 considered harmful today: creating a rogue CA certificate, available at http:\/\/www.win.tue.nl\/hashclash\/rogue-ca\/"},{"key":"23_CR16","volume-title":"Phishing Exposed","author":"L. James","year":"2005","unstructured":"L.\u00a0James: Phishing Exposed (Syngress, Rockland 2005)"},{"key":"23_CR17","volume-title":"Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft","year":"2007","unstructured":"M.\u00a0Jakobsson, S.\u00a0Myers (Eds.): Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft (Wiley, Hoboken 2007)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:24Z","timestamp":1606167564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_23","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}