{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:17:35Z","timestamp":1769239055259,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642353611","type":"print"},{"value":"9783642353628","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_31","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T22:55:47Z","timestamp":1354229747000},"page":"414-426","source":"Crossref","is-referenced-by-count":14,"title":["Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against Phishing"],"prefix":"10.1007","author":[{"given":"Max-Emanuel","family":"Maurer","sequence":"first","affiliation":[]},{"given":"Lukas","family":"H\u00f6fer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"PhishTank: Statistics about phishing activity and PhishTank usage, http:\/\/www.phishtank.com\/stats.php (last accessed April 28, 2012)"},{"key":"31_CR2","unstructured":"Goodin, D.: Google bots detect 9,500 new malicious websites every day, http:\/\/arstechnica.com\/security\/2012\/06\/google-detects-9500-new-malicious-websites-daily\/ (last visited July 12, 2012)"},{"key":"31_CR3","unstructured":"Google Inc.: Safe browsing API \u2014 google developers, https:\/\/developers.google.com\/safe-browsing\/ (last accessed April 28, 2012)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Hong, J.: The state of phishing attacks. Communications of the ACM (2012)","DOI":"10.1145\/2063176.2063197"},{"key":"31_CR5","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding phish: Evaluating anti-phishing tools. In: NDSS (2007)"},{"key":"31_CR6","unstructured":"Moscaritolo, A.: Number of phishing URLs at alltime high, http:\/\/www.scmagazine.com\/number-of-phishing-urls-at-all-time-high\/article\/150010\/ (last visited July 12, 2012)"},{"key":"31_CR7","unstructured":"Riden, J.: How fast-flux server networks work (2008), http:\/\/www.honeynet.org\/node\/132 (last visited July 12, 2012)"},{"key":"31_CR8","unstructured":"Whitten, A., Tygar, J.D.: Why johnny can\u2019t encrypt: A usability evaluation of PGP 5.0. In: 8th USENIX Security Symposium (1999)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: CHI (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"31_CR11","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-side defense against web-based identity theft. In: NDSS (2004)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: WWW (2007)","DOI":"10.1145\/1242572.1242659"},{"key":"31_CR13","unstructured":"Phelps, T.A., Wilensky, R.: Robust hyperlinks cost just five words each. Technical Report (2000)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: CANTINA+: a feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security (2011)","DOI":"10.1145\/2019599.2019606"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Krammer, V.: Phishing defense against IDN address spoofing attacks. In: PST (2006)","DOI":"10.1145\/1501434.1501473"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Gabrilovich, E., Gontmakher, A.: The homograph attack. Communications of the ACM (2002)","DOI":"10.1145\/503124.503156"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Gusfield, D.: Algorithms on strings, trees, and sequences: computer science and computational biology. Cambridge University Press (1997)","DOI":"10.1017\/CBO9780511574931"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: CHI (2011)","DOI":"10.1145\/1978942.1979244"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Postel, J.: Domain Name System Structure and Delegation. RFC 1591, Informational (1994)","DOI":"10.17487\/rfc1591"},{"key":"31_CR20","unstructured":"Mozilla Foundation: Public suffix list, http:\/\/publicsuffix.org\/list\/ (last accessed April 29, 2012)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T10:32:03Z","timestamp":1576146723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}