{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:44:05Z","timestamp":1742928245548,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819616237"},{"type":"electronic","value":"9789819616244"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1624-4_20","type":"book-chapter","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T06:53:48Z","timestamp":1738652028000},"page":"257-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Phishing-Targeted Web Push Notifications Through Image Similarity Analysis"],"prefix":"10.1007","author":[{"given":"Rion","family":"Matsuzaki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3944-2012","authenticated-orcid":false,"given":"Masaya","family":"Sato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,5]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Bay, H., Tuytelaars, T., Van\u00a0Gool, L.: SURF: speeded up robust features. In: Computer Vision\u2013ECCV 2006: 9th European Conference on Computer Vision, Graz, Austria, 7-13 May 2006. Proceedings, Part I 9, pp. 404\u2013417. Springer (2006)","DOI":"10.1007\/11744023_32"},{"issue":"4","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/TIP.2011.2173206","volume":"21","author":"D Brunet","year":"2011","unstructured":"Brunet, D., Vrscay, E.R., Wang, Z.: On the mathematical properties of the structural similarity index. IEEE Trans. Image Process. 21(4), 1488\u20131499 (2011)","journal-title":"IEEE Trans. Image Process."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Shelly, D.: GoldPhish: using images for content-based phishing analysis. In: 2010 Fifth International Conference on Internet Monitoring and Protection, pp. 123\u2013128. IEEE (2010)","DOI":"10.1109\/ICIMP.2010.24"},{"key":"20_CR4","unstructured":"Group, A.P.W.: Phishing attack trends report - 4Q (2023). https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2023.pdf"},{"issue":"10","key":"20_CR5","doi-asserted-by":"publisher","first-page":"3071","DOI":"10.1016\/j.patcog.2008.03.013","volume":"41","author":"CR Huang","year":"2008","unstructured":"Huang, C.R., Chen, C.S., Chung, P.C.: Contrast context histogram-an efficient discriminating local descriptor for object recognition and image matching. Pattern Recogn. 41(10), 3071\u20133077 (2008)","journal-title":"Pattern Recogn."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Le-Nguyen, M.K., Nguyen, T.C.H., Le, D.T., Nguyen, V.H., T\u00f4n, L.P., Nguyen-An, K.: Phishing website detection as a website comparing problem. SN Comput. Sci.\u00a04 (2023)","DOI":"10.1007\/s42979-022-01544-9"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, H., Park, J., Shin, I., Son, S.: Pride and prejudice in progressive web apps: abusing native app-like features in web applications. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1731\u20131746 (2018)","DOI":"10.1145\/3243734.3243867"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60, 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vision"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"17020","DOI":"10.1109\/ACCESS.2017.2743528","volume":"5","author":"J Mao","year":"2017","unstructured":"Mao, J., Tian, W., Li, P., Wei, T., Liang, Z.: Phishing-alarm: robust and efficient phishing detection via page component similarity. IEEE Access 5, 17020\u201317030 (2017)","journal-title":"IEEE Access"},{"key":"20_CR10","unstructured":"McQuade, B.: Defining the core web vitals metrics thresholds. https:\/\/web.dev\/articles\/defining-core-web-vitals-thresholds"},{"key":"20_CR11","unstructured":"MDN Web Docs: Notification - web API | MDN. https:\/\/developer.mozilla.org\/en\/docs\/Web\/API\/Notification"},{"key":"20_CR12","unstructured":"MDN Web Docs: Push API - web API | MDN. https:\/\/developer.mozilla.org\/en\/docs\/Web\/API\/Push_API"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Medvet, E., Kirda, E., Kruegel, C.: Visual-similarity-based phishing detection. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, pp.\u00a01\u20136 (2008)","DOI":"10.1145\/1460877.1460905"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"4975","DOI":"10.1007\/s00521-021-06305-y","volume":"35","author":"S Mishra","year":"2023","unstructured":"Mishra, S., Soni, D.: DSmishSMS-a system to detect Smishing SMS. Neural Comput. Appl. 35, 4975\u20134992 (2023)","journal-title":"Neural Comput. Appl."},{"key":"20_CR15","unstructured":"Mitmproxy: Github - Mitmproxy. https:\/\/github.com\/mitmproxy\/mitmproxy"},{"key":"20_CR16","unstructured":"PublicWWW: Search engine for source code-publicwww.com. https:\/\/publicwww.com"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Rosiello, A.P., et\u00a0al.: A layout-similarity-based approach for detecting phishing pages. In: 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-securecomm 2007, pp. 454\u2013463. IEEE (2007)","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"20_CR18","unstructured":"Seng, S., Al-Ameen, M.N., Wright, M.: Understanding users\u2019 decision of clicking on posts in Facebook with implications for phishing. In: Workshop on Technology and Consumer Protection (ConPro 2018) (2018)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Subramani, K., Yuan, X., Setayeshfar, O., Vadrevu, P., Lee, H., K., Perdisci, R.: When push comes to Ads: measuring the rise of (malicious) push advertising. In: Proceedings of the ACM Internet Measurement Conference, pp. 724\u2013737 (2020)","DOI":"10.1145\/3419394.3423631"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: CANTINA: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639\u2013648 (2007)","DOI":"10.1145\/1242572.1242659"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1624-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T06:53:59Z","timestamp":1738652039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1624-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819616237","9789819616244"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1624-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}