{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:53Z","timestamp":1725725453475},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_89","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T11:40:44Z","timestamp":1367667644000},"page":"796-802","source":"Crossref","is-referenced-by-count":2,"title":["Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System"],"prefix":"10.1007","author":[{"given":"Inkyung","family":"Jeun","sequence":"first","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"89_CR1","unstructured":"APWG, Global Phishing Survey : Trends and Domain Name Use in 1H 2011 (January-June 2011)"},{"key":"89_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-21793-7_35","volume-title":"Human Interface and the Management of Information. Interacting with Information","author":"W. Jeon","year":"2011","unstructured":"Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol.\u00a06771, pp. 311\u2013320. Springer, Heidelberg (2011)"},{"key":"89_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ou, Y., Li, D., Xin, Y.: A Prior-based Transfer Learning Method for the Phishing Detection. Journal of Networks 7(8) (August 2012)","DOI":"10.4304\/jnw.7.8.1201-1207"},{"key":"89_CR4","unstructured":"OpenDNS Phishtank (2011), \n                    \n                      http:\/\/www.phishtank.com\/"},{"key":"89_CR5","unstructured":"Google, Google Safe Browsing API Developer\u2019s Guide (v2) (2009), \n                    \n                      http:\/\/code.google.com\/intl\/zh-CN\/apis\/safebrowsing\/developers_guide_v2.html"},{"key":"89_CR6","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J.I.: A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In: International Conference on World Wide Web (WWW) (2009)","DOI":"10.1145\/1526709.1526786"},{"key":"89_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-35264-5_21","volume-title":"Computer Applications for Security, Control and System Engineering","author":"I. Jeun","year":"2012","unstructured":"Jeun, I., Lee, Y., Won, D.: A Practical Study on Advanced Persistent Threats. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol.\u00a0339, pp. 144\u2013152. Springer, Heidelberg (2012)"},{"key":"89_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: The 16th International Conference on World Wide Web (WWW 2007) (2007)","DOI":"10.1145\/1242572.1242659"},{"key":"89_CR9","unstructured":"Cordero, A., Blain, T.: Catching Phish: Detecting Phishing Attacks From Rendered Website Images (2006)"},{"key":"89_CR10","unstructured":"Alkhozae, M.G., Maratfi, O.A.: Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code. International Journal of Information and Communication Technology Research (2011)"},{"key":"89_CR11","unstructured":"KISA, \n                    \n                      http:\/\/www.krecert.or.kr"},{"key":"89_CR12","doi-asserted-by":"crossref","unstructured":"Kidra, E., Kruegel, C.: Protecting Users against Phishing Attacks. The Computer Journal 49 (2006)","DOI":"10.1093\/comjnl\/bxh169"},{"key":"89_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-73614-1_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C. Ludl","year":"2007","unstructured":"Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol.\u00a04579, pp. 20\u201339. Springer, Heidelberg (2007)"},{"key":"89_CR14","doi-asserted-by":"crossref","unstructured":"Prakash, P., et al.: PhishNet: Predictive Blacklisting to Detect Phishing Attacks. In: IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462216"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_89","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:31:15Z","timestamp":1557682275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_89","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}