{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:40Z","timestamp":1759091560136},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_15","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"194-207","source":"Crossref","is-referenced-by-count":22,"title":["Phishing Detection with Popular Search Engines: Simple and Effective"],"prefix":"10.1007","author":[{"given":"Jun Ho","family":"Huh","sequence":"first","affiliation":[]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Aaron, G., Rasmussen, R.: Global phishing survey: Trends and domain name use in 2h2009 (May 2010), http:\/\/www.antiphishing.org\/reports\/APWG_GlobalPhishingSurvey_2H2009.pdf"},{"key":"15_CR2","first-page":"51","volume-title":"DIM 2008: Proceedings of the 4th ACM Workshop on Digital Identity Management","author":"Y. Cao","year":"2008","unstructured":"Cao, Y., Han, W., Le, Y.: Anti-phishing based on automated individual white-list. In: DIM 2008: Proceedings of the 4th ACM Workshop on Digital Identity Management, pp. 51\u201360. ACM, New York (2008)"},{"key":"15_CR3","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-Side Defense Against Web-Based Identity Theft. In: NDSS 2004: Proceedings of the Network and Distributed System Security Symposium (2004)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cristianini, N., Shawe-Taylor, J.: An introduction to support vector machines: and other kernel-based learning methods, 1st edn. Cambridge University Press (March 2000)","DOI":"10.1017\/CBO9780511801389"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TPAMI.2002.1033219","volume":"24","author":"C. Domeniconi","year":"2002","unstructured":"Domeniconi, C., Peng, J., Gunopulos, D.: Locally adaptive metric nearest-neighbor classification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024, 1281\u20131285 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2-3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P. Domingos","year":"1997","unstructured":"Domingos, P., Pazzani, M.: On the Optimality of the Simple Bayesian Classifier under Zero-One Loss. Machine Learning\u00a029(2-3), 103\u2013130 (1997)","journal-title":"Machine Learning"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/TDSC.2006.50","volume":"3","author":"A.Y. Fu","year":"2006","unstructured":"Fu, A.Y., Wenyin, L., Deng, X.: Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover\u2019s Distance (EMD). IEEE Transactions on Dependable and Secure Computing\u00a03(4), 301\u2013311 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"15_CR8","volume-title":"Introduction to statistical pattern recognition","author":"K. Fukunaga","year":"1990","unstructured":"Fukunaga, K.: Introduction to statistical pattern recognition, 2nd edn. Academic Press Professional, Inc., San Diego (1990)","edition":"2"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"M.A. Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osman, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intelligent Systems and their Applications\u00a013(4), 18\u201328 (1998)","journal-title":"IEEE Intelligent Systems and their Applications"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/SAINT.2009.14","volume-title":"Ninth Annual International Symposium on Applications and the Internet, SAINT 2009","author":"K. Bian","year":"2009","unstructured":"Bian, K., Park, J.-M., Hsiao, M.S., Belanger, F., Hiller, J.: Evaluation of Online Resources in Assisting Phishing Detection. In: Ninth Annual International Symposium on Applications and the Internet, SAINT 2009, pp. 30\u201336. IEEE Computer Society, Bellevue (2009)"},{"issue":"11","key":"15_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1049\/el.2011.0399","volume":"47","author":"H. Kim","year":"2011","unstructured":"Kim, H., Huh, J.H.: Detecting DNS-poisoning-based phishing attacks from their network performance characteristic. Electronics Letters\u00a047(11), 656\u2013658 (2011)","journal-title":"Electronics Letters"},{"key":"15_CR12","first-page":"517","volume-title":"COMPSAC 2005: Proceedings of the 29th Annual International Computer Software and Applications Conference","author":"E. Kirda","year":"2005","unstructured":"Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks with AntiPhish. In: COMPSAC 2005: Proceedings of the 29th Annual International Computer Software and Applications Conference, pp. 517\u2013524. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"15_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-45164-1_25","volume-title":"Machine Learning: ECML 2000","author":"M. Latourrette","year":"2000","unstructured":"Latourrette, M.: Toward an Explanatory Similarity Measure for Nearest-Neighbor Classification. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 238\u2013245. Springer, Heidelberg (2000)"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2006.23","volume":"10","author":"W. Liu","year":"2006","unstructured":"Liu, W., Deng, X., Huang, G., Fu, A.Y.: An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing\u00a010(2), 58\u201365 (2006)","journal-title":"IEEE Internet Computing"},{"key":"15_CR15","first-page":"1","volume-title":"eCrime 2007: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit","author":"T. Moore","year":"2007","unstructured":"Moore, T., Clayton, R.: Examining the impact of website take-down on phishing. In: eCrime 2007: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 1\u201313. ACM, New York (2007)"},{"key":"15_CR16","first-page":"381","volume-title":"ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference","author":"Y. Pan","year":"2006","unstructured":"Pan, Y., Ding, X.: Anomaly Based Web Phishing Page Detection. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 381\u2013392. IEEE Computer Society, Washington, DC, USA (2006)"},{"key":"15_CR17","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: Proceedings of IJCAI-2001 Workshop on Empirical Methods in Artificial Intelligence (2001)"},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1145\/1357010.1352620","volume":"42","author":"T. Ronda","year":"2008","unstructured":"Ronda, T., Saroiu, S., Wolman, A.: Itrustpage: a user-assisted anti-phishing tool. ACM SIGOPS Operating Systems Review\u00a042(4), 261\u2013272 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"15_CR19","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: CEAS 2009: Proceedings of the 6th Conference on Email and Anti-Spam (2009)"},{"key":"15_CR20","unstructured":"Vapnik, V.N.: Statistical Learning Theory. Wiley-Interscience (September 1998)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X. Wu","year":"2007","unstructured":"Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowledge and Information Systems\u00a014(1), 1\u201337 (2007)","journal-title":"Knowledge and Information Systems"},{"key":"15_CR22","first-page":"571","volume-title":"WWW 2009: Proceedings of the 18th international conference on World wide web","author":"G. Xiang","year":"2009","unstructured":"Xiang, G., Hong, J.I.: A hybrid phish detection approach by identity discovery and keywords retrieval. In: WWW 2009: Proceedings of the 18th international conference on World wide web, pp. 571\u2013580. ACM, New York (2009)"},{"key":"15_CR23","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: Evaluating Anti-Phishing Tools. In: NDSS 2007: Proceedings of the 14th Annual Network and Distributed System Security Symposium (2007)"},{"key":"15_CR24","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1145\/1242572.1242659","volume-title":"WWW 2007: Proceedings of the 16th International Conference on World Wide Web","author":"Y. Zhang","year":"2007","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 639\u2013648. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,26]],"date-time":"2021-12-26T06:00:52Z","timestamp":1640498452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}