{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:54:13Z","timestamp":1770155653186,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_13","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:50Z","timestamp":1770109070000},"page":"213-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FraudTrace: Verifying Fraudulent News to\u00a0Prevent Online Scam Campaigns via\u00a0a\u00a0Multi-agent LLM-Based System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6426-3558","authenticated-orcid":false,"given":"Nguyen Hoang","family":"Phuc","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3218-0672","authenticated-orcid":false,"given":"Bui Tan Hai","family":"Dang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0065-9919","authenticated-orcid":false,"given":"Nguyen Huu","family":"Quyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"Phan The","family":"Duy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"41574","DOI":"10.1109\/ACCESS.2022.3166474","volume":"10","author":"R Abdillah","year":"2022","unstructured":"Abdillah, R., Shukur, Z., Mohd, M., Murah, T.M.Z.: Phishing classification techniques: a systematic literature review. IEEE Access 10, 41574\u201341591 (2022)","journal-title":"IEEE Access"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Afane, K., Wei, W., Mao, Y., Farooq, J., Chen, J.: Next-generation phishing: how LLM agents empower cyber attackers. In: 2024 IEEE International Conference on Big Data (BigData), pp. 2558\u20132567. IEEE (2024)","DOI":"10.1109\/BigData62323.2024.10825018"},{"key":"13_CR3","first-page":"2761","volume":"218","author":"S Ahmad","year":"2023","unstructured":"Ahmad, S., Khan, M., Kumari, S.: Fake news detection and classification: a comparative study of convolutional neural networks, large language models, and natural language processing models. Procedia Comput. Sci. 218, 2761\u20132770 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"13_CR4","unstructured":"Alam, F., et al.: A survey on multimodal disinformation detection. arXiv preprint arXiv:2103.12541 (2021)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Almandouh, M.E., Alrahmawy, M.F., Eisa, M., Elhoseny, M., Tolba, A.S.: Ensemble based high performance deep learning models for fake news detection. Scientific Reports (2024)","DOI":"10.1038\/s41598-024-76286-0"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Azri, A., Favre, C., Harbi, N., Darmont, J., No\u00fbs, C.: MONITOR: a multimodal fusion framework to assess message veracity in social networks. In: Bellatreche, L., Dumas, M., Karras, P., Matulevi\u010dius, R. (eds.) ADBIS 2021. LNCS, vol. 12843, pp. 73\u201387. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-82472-3_7","DOI":"10.1007\/978-3-030-82472-3_7"},{"key":"13_CR7","unstructured":"Bethany, M., Galiopoulos, A., Bethany, E., Karkevandi, M.B., Vishwamitra, N., Najafirad, P.: Large language model lateral spear phishing: a comparative study in large-scale organizational settings. arXiv preprint arXiv:2401.09727 (2024)"},{"key":"13_CR8","unstructured":"CrewAI: Crewai: Build agentic workflows with multi-agent collaboration (2024). crewAI Documentation"},{"issue":"8","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469886","volume":"54","author":"G Desolda","year":"2021","unstructured":"Desolda, G., Ferro, L.S., Marrella, A., Catarci, T., Costabile, M.F.: Human factors in phishing attacks: a systematic literature review. ACM Comput. Surv. (CSUR) 54(8), 1\u201335 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"13_CR10","unstructured":"Group, A.P.W.: Phishing attack trends report \u2013 4q 2024 (2024). https:\/\/apwg.org\/trendsreports\/. Accessed 07 Jun 2025"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Guo, Z., Cho, J.H., Chen, R., Sengupta, S., Hong, M., Mitra, T.: Safer: social capital-based friend recommendation to defend against phishing attacks. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a016, pp. 241\u2013252 (2022)","DOI":"10.1609\/icwsm.v16i1.19288"},{"key":"13_CR12","unstructured":"Hazell, J.: Large language models can be used to effectively scale spear phishing campaigns. arXiv preprint arXiv:2305.06972 (2023)"},{"key":"13_CR13","unstructured":"Hu, E., Shen, Y., Wallis, P., et\u00a0al.: Lora: low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685 (2021)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Huynh, A.T., Tran, P.: Utilizing transformer models to detect vietnamese fake news on social media platforms. KSII Trans. Internet Inf. Syst. 19(2), 1234\u20131249 (2025), https:\/\/itiis.org\/digital-library\/102085","DOI":"10.3837\/tiis.2025.02.006"},{"key":"13_CR15","unstructured":"Ireton, C., Posetti, J.: Journalism, \u2019Fake News\u2019 and Disinformation: A Handbook for Journalism Education and Training. UNESCO Publishing (2018)"},{"key":"13_CR16","unstructured":"Jr, E.C.T., Lim, Z.W., Ling, R.: Defining \u201cfake news\u201d: A typology of scholarly definitions. Digital Journalism (2018)"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s40537-025-01093-x","volume":"12","author":"HR LekshmiAmmal","year":"2025","unstructured":"LekshmiAmmal, H.R., Madasamy, A.K.: A reasoning based explainable multimodal fake news detection for low resource language using large language models and transformers. J. Big Data 12(1), 46 (2025)","journal-title":"J. Big Data"},{"key":"13_CR18","unstructured":"Lewis, P., et\u00a0al.: Retrieval-augmented generation for knowledge-intensive NLP tasks. In: Advances in Neural Information Processing Systems, vol.\u00a033, pp. 9459\u20139474 (2020). https:\/\/arxiv.org\/abs\/2005.11401"},{"key":"13_CR19","unstructured":"Monterrubio, S.M.M., Noain-S\u00e1nchez, A., P\u00e9rez, E.V., Crespo, R.G.: Coronavirus fake news detection via medosint check in health care official bulletins with cbr explanation (2023)"},{"key":"13_CR20","unstructured":"OpenAI: Gpt-4 technical report (2023). https:\/\/openai.com\/research\/gpt-4"},{"issue":"8","key":"13_CR21","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3390\/fi16080298","volume":"16","author":"E Papageorgiou","year":"2024","unstructured":"Papageorgiou, E., Chronis, C., Varlamis, I., Himeur, Y.: A survey on the use of large language models (LLMS) in fake news. Future Internet 16(8), 298 (2024)","journal-title":"Future Internet"},{"key":"13_CR22","unstructured":"Shu, K.: Fakenewsnet (2021). https:\/\/github.com\/KaiDMML\/FakeNewsNet"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Tian, K., Jan, S.T., Hu, H., Yao, D., Wang, G.: Needle in a haystack: tracking down elite phishing domains in the wild. In: Proceedings of the Internet Measurement Conference 2018, pp. 429\u2013442 (2018)","DOI":"10.1145\/3278532.3278569"},{"key":"13_CR24","unstructured":"Vinh, V.D., Do, P.: Detecting vietnamese fake news. Can Tho Univ. J. Sci.58(1), 55\u201364 (2022). https:\/\/ctujs.ctu.edu.vn\/index.php\/ctujs\/article\/view\/680\/650"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Q., Tsai, W.T., Shi, T., Liu, Z., Du, B.: Catch me if you can: a multi-agent synthetic fraud detection framework for complex networks. In: 2025 IEEE 41st International Conference on Data Engineering (ICDE), pp. 3629\u20133641. IEEE Computer Society (2025)","DOI":"10.1109\/ICDE65448.2025.00271"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Y.W.: \u201cliar, liar pants on fire\u201d: a new benchmark dataset for fake news detection. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pp. 422\u2013426 (2017)","DOI":"10.18653\/v1\/P17-2067"},{"key":"13_CR27","unstructured":"Wardle, C., Derakhshan, H.: Information disorder: toward an interdisciplinary framework for research and policy making (2017)"},{"key":"13_CR28","unstructured":"Welbl, J., Stenning, S.: Fine-tuned \u2019small\u2019 LLMS (still) significantly outperform zero-shot generative AI models in text classification. arXiv preprint arXiv:2402.01325 (2024)"},{"issue":"6","key":"13_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2025.104241","volume":"62","author":"C Xiong","year":"2025","unstructured":"Xiong, C., Zheng, G., Ma, X., Li, C., Zeng, J.: Delphiagent: a trustworthy multi-agent verification framework for automated fact verification. Inf. Process. Manag. 62(6), 104241 (2025)","journal-title":"Inf. Process. Manag."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Yadav, A., Kumar, A., Singh, V.: Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cybersecurity. Cybersecur. J. (2023)","DOI":"10.1007\/s10462-023-10454-y"},{"key":"13_CR31","unstructured":"Zhang, M., Lee, D., Zhao, Y.: Analysis of disinformation and fake news detection using fine-tuned large language model. arXiv preprint arXiv:2309.04704 (2023), https:\/\/ar5iv.labs.arxiv.org\/html\/2309.04704"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:58Z","timestamp":1770109078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}