{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:23:14Z","timestamp":1768418594076,"version":"3.49.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10799-021-00351-7","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T13:02:44Z","timestamp":1642424564000},"page":"271-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A lightweight and proactive rule-based incremental construction approach to detect phishing scam"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8113-3715","authenticated-orcid":false,"given":"M.","family":"SatheeshKumar","sequence":"first","affiliation":[]},{"given":"K. G.","family":"Srinivasagan","sequence":"additional","affiliation":[]},{"given":"G.","family":"UnniKrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"351_CR1","doi-asserted-by":"publisher","unstructured":"Kumar S, Ben-Othman J, Srinivasagan KG and Krishnan U (2019) Artificial intelligence managed network defense system against port scanning outbreaks. In: Proceedings of the International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), IEEE Xplore, (March 2019), p 1\u20135. https:\/\/doi.org\/10.1109\/ViTECoN.2019.8899380","DOI":"10.1109\/ViTECoN.2019.8899380"},{"issue":"5","key":"351_CR2","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1108\/ICS-03-2017-0009","volume":"25","author":"J-W Bullee","year":"2017","unstructured":"Bullee J-W, Montoya L, Junger M, Hartel P (2017) Spear phishing in organisations explained. Inf Comput Secur 25(5):593\u2013613. https:\/\/doi.org\/10.1108\/ICS-03-2017-0009","journal-title":"Inf Comput Secur"},{"key":"351_CR3","doi-asserted-by":"publisher","unstructured":"Lakhita SY, Bohra B, Pooja M (2015) A review on recent phishing attacks in Internet. In: Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (ICGCIOT' 15). IEEE Computer Society, USA, p 1312\u20131315. https:\/\/doi.org\/10.1109\/ICGCIoT.2015.7380669","DOI":"10.1109\/ICGCIoT.2015.7380669"},{"key":"351_CR4","doi-asserted-by":"publisher","unstructured":"Sumner A and Yuan X (2019) Mitigating Phishing Attacks: An Overview. In: Proceedings of the 2019 ACM Southeast Conference (ACM SE' 19). Association for Computing Machinery, New York, NY, USA, p 72\u201377. https:\/\/doi.org\/10.1145\/3299815.3314437","DOI":"10.1145\/3299815.3314437"},{"key":"351_CR5","doi-asserted-by":"publisher","unstructured":"Ghafir I, Prenosil V, Hammoudeh M, Aparicio-Navarro FJ, Rabie K, and Jabban A (2018) Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS' 18). Association for Computing Machinery, New York, NY, USA, Article 44, 1\u20135. https:\/\/doi.org\/10.1145\/3231053.3231097","DOI":"10.1145\/3231053.3231097"},{"key":"351_CR6","doi-asserted-by":"crossref","unstructured":"Verizon.com, Inc. 2019. Data Breach Investigations Report. Retrieved from https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf","DOI":"10.1016\/S1361-3723(19)30060-0"},{"key":"351_CR7","unstructured":"Phislab.com, Inc. 2019. Phishing Trends and Intelligence Report. Retrieved from https:\/\/info.phishlabs.com\/hubfs\/2019%20PTI%20Report\/2019%20Phishing%20Trends%20and%20Intelligence%20Report.pdf"},{"key":"351_CR8","unstructured":"Ic3.gov, Inc. 2018. Internet Crime Complaint Center - Internet Crime Report. Retrieved from https:\/\/pdf.ic3.gov\/2018_IC3Report.pdf"},{"key":"351_CR9","doi-asserted-by":"publisher","unstructured":"Li F, Lai A and Ddl D (2011) Evidence of Advanced Persistent Threat: A case study of malware for political espionage, 2011. In: 6th International Conference on Malicious and Unwanted Software. Fajardo. pp. 102-109. https:\/\/doi.org\/10.1109\/MALWARE.2011.6112333","DOI":"10.1109\/MALWARE.2011.6112333"},{"issue":"1","key":"351_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong J (2012) The state of phishing attacks. Commun ACM 55(1):74\u201381. https:\/\/doi.org\/10.1145\/2063176.2063197","journal-title":"Commun ACM"},{"key":"351_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3590","author":"M Satheesh Kumar","year":"2019","unstructured":"Satheesh Kumar M, Srinivasagan KG, Ben-Othman J (2019) Sniff-phish: a novel framework for resource intensive computation in cloud to detect email scam. Trans Emerging Tel Tech. https:\/\/doi.org\/10.1002\/ett.3590","journal-title":"Trans Emerging Tel Tech"},{"key":"351_CR12","doi-asserted-by":"publisher","unstructured":"Dhamija R, Tygar JD, and Hearst M (2006) Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 06). Association for Computing Machinery, New York, NY, USA, p 581\u2013590. https:\/\/doi.org\/10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"issue":"C","key":"351_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby M, Alaca F, Chiasson S (2015) Why phishing still works. Int J Hum Comput Stud 82(C):69\u201382. https:\/\/doi.org\/10.1016\/j.ijhcs.2015.05.005","journal-title":"Int J Hum Comput Stud"},{"key":"351_CR14","doi-asserted-by":"publisher","unstructured":"Orunsolu AA, Sodiya AS and Akinwale AT (2019) A predictive model for phishing detection. J King Saud Univ. Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.005","DOI":"10.1016\/j.jksuci.2019.12.005"},{"key":"351_CR15","doi-asserted-by":"publisher","unstructured":"Le A, Markopoulou A and Faloutsos M (2011) PhishDef: URL names say it all. In: Proceedings IEEE INFOCOM, Shanghai. (June 2011). P 191\u2013195. https:\/\/doi.org\/10.1109\/INFCOM.2011.5934995","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"351_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.07.005","author":"G Sonowal","year":"2017","unstructured":"Sonowal G, Kuppusamy KS (2017) PhiDMA \u2013 A phishing detection model with multi-filter approach. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2017.07.005","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"351_CR17","doi-asserted-by":"publisher","unstructured":"Niakanlahiji A, Chu B and Al-Shaer E (2018) PhishMon: a Machine Learning Framework for Detecting Phishing Webpages. In: IEEE International Conference on Intelligence and Security Informatics (ISI). Miami. FL (November 2018). p 220\u2013225. https:\/\/doi.org\/10.1109\/ISI.2018.8587410","DOI":"10.1109\/ISI.2018.8587410"},{"key":"351_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","volume":"53","author":"M Moghimi","year":"2016","unstructured":"Moghimi M, Varjani AY (2016) New rule-based phishing detection method. Expert Syst Appl 53:231\u2013242. https:\/\/doi.org\/10.1016\/j.eswa.2016.01.028","journal-title":"Expert Syst Appl"},{"key":"351_CR19","doi-asserted-by":"publisher","unstructured":"Zhang J, Pan Y, Wang Z and Liu B (2017) URL based gateway side phishing detection method. IEEE Trustcom\/BigDataSE\/ISPA. Tianjin. 268\u2013275. https:\/\/doi.org\/10.1109\/TrustCom.2016.0073","DOI":"10.1109\/TrustCom.2016.0073"},{"key":"351_CR20","doi-asserted-by":"publisher","unstructured":"Verma R and Das A (2017) What's in a URL: Fast Feature Extraction and Malicious URL Detection. In: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics (IWSPA' 17). Association for Computing Machinery, New York, NY, USA, p 55\u201363. https:\/\/doi.org\/10.1145\/3041008.3041016","DOI":"10.1145\/3041008.3041016"},{"key":"351_CR21","doi-asserted-by":"publisher","unstructured":"Yue C and Wang H (2010) BogusBiter: a transparent protection against phishing attacks. ACM Trans Internet Technol 10(2):31, Article 6. https:\/\/doi.org\/10.1145\/1754393.1754395","DOI":"10.1145\/1754393.1754395"},{"key":"351_CR22","doi-asserted-by":"crossref","unstructured":"Shreeram V, Suban M, Shanthi P & Manjula K (2010) Anti-phishing detection of phishing attacks using genetic algorithm. In: Proceedings of the International Conference on Communication Control and Computing Technologies, p 447\u2013450","DOI":"10.1109\/ICCCCT.2010.5670593"},{"key":"351_CR23","doi-asserted-by":"publisher","DOI":"10.12720\/joace.4.2.159-165","author":"LAT Nguyen","year":"2016","unstructured":"Nguyen LAT, Nguyen HK, To BL (2016) An efficient approach based on neuro-fuzzy for phishing detection. J Autom Control Eng. https:\/\/doi.org\/10.12720\/joace.4.2.159-165","journal-title":"J Autom Control Eng"},{"key":"351_CR24","doi-asserted-by":"crossref","unstructured":"Pao H-K, Chou Y-L, and Lee Y-J (2012) Malicious URL Detection Based on Kolmogorov Complexity Estimation. In: Proceedings of the The 2012 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01 (WI-IAT' 12). IEEE Computer Society, USA, p 380\u2013387","DOI":"10.1109\/WI-IAT.2012.258"},{"key":"351_CR25","doi-asserted-by":"publisher","unstructured":"Le A, Markopoulou A and Faloutsos M (2011) PhishDef: URL names say it all. In: 2011 Proceedings IEEE INFOCOM, Shanghai, China, p 191-195. https:\/\/doi.org\/10.1109\/INFCOM.2011.5934995","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"351_CR26","doi-asserted-by":"publisher","unstructured":"Xiang G, Hong J, Rose CP, and Cranor L (2011) CANTINA+: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur 14(2):28 Article 21. https:\/\/doi.org\/10.1145\/2019599.2019606","DOI":"10.1145\/2019599.2019606"},{"key":"351_CR27","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","volume":"25","author":"RM Mohammad","year":"2014","unstructured":"Mohammad RM, Thabtah F, McCluskey L (2014) Predicting phishing websites based on self-structuring neural network. Neural Comput Appl 25:443\u2013458. https:\/\/doi.org\/10.1007\/s00521-013-1490-z","journal-title":"Neural Comput Appl"},{"key":"351_CR28","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s13673-016-0064-3","volume":"6","author":"SC Jeeva","year":"2016","unstructured":"Jeeva SC, Rajsingh EB (2016) Intelligent phishing url detection using association rule mining. Hum Cent Comput Inf Sci 6:10. https:\/\/doi.org\/10.1186\/s13673-016-0064-3","journal-title":"Hum Cent Comput Inf Sci"},{"key":"351_CR29","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s13673-017-0098-1","volume":"7","author":"M Zouina","year":"2017","unstructured":"Zouina M, Outtaj B (2017) A novel lightweight URL phishing detection system using SVM and similarity index. Hum Cent Comput Inf Sci 7:17. https:\/\/doi.org\/10.1186\/s13673-017-0098-1","journal-title":"Hum Cent Comput Inf Sci"},{"key":"351_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0786-3","author":"F Feng","year":"2018","unstructured":"Feng F, Zhou Q, Shen Z et al (2018) The application of a novel neural network in the detection of phishing websites. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-018-0786-3","journal-title":"J Ambient Intell Human Comput"},{"key":"351_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dss.2018.01.001","volume":"107","author":"S Smadi","year":"2018","unstructured":"Smadi S, Aslam N, Zhang L (2018) Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis Support Syst 107:88\u2013102","journal-title":"Decis Support Syst"},{"issue":"8","key":"351_CR32","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"R Rao","year":"2018","unstructured":"Rao R, Pais A (2018) Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput Appl 31(8):3851\u20133873","journal-title":"Neural Comput Appl"},{"issue":"9","key":"351_CR33","first-page":"1","volume":"1","author":"AK Jain","year":"2016","unstructured":"Jain AK, Gupta BB (2016) A novel approach to protect against phishing attacks at client side using auto-updated white-list. EURASIP J Inf Secur 1(9):1\u201311","journal-title":"EURASIP J Inf Secur"},{"issue":"12","key":"351_CR34","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s00500-018-3084-2","volume":"23","author":"M Babagoli","year":"2019","unstructured":"Babagoli M, Aghababa MP, Solouk V (2019) Heuristic nonlinear regression strategy for detecting phishing websites. Soft Comput 23(12):4315\u20134327","journal-title":"Soft Comput"},{"key":"351_CR35","doi-asserted-by":"publisher","unstructured":"Chhabra S, Aggarwal A, Benevenuto F, and Kumaraguru P (2011) Phi.sh\/$oCiaL: the phishing landscape through short URLs. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS' 11). Association for Computing Machinery, New York, NY, USA, p 92\u2013101. https:\/\/doi.org\/10.1145\/2030376.2030387","DOI":"10.1145\/2030376.2030387"},{"key":"351_CR36","unstructured":"SSL Labs. SSL test for the public web servers. 2019. https:\/\/www.ssllabs.com\/ssltest\/"},{"key":"351_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006","author":"A Aleroud","year":"2017","unstructured":"Aleroud A, Zhou L (2017) Phishing environments, techniques, and countermeasures: a survey. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2017.04.006","journal-title":"Comput Secur"},{"key":"351_CR38","doi-asserted-by":"publisher","first-page":"6266","DOI":"10.1002\/sec.1674","volume":"9","author":"G Varshney","year":"2016","unstructured":"Varshney G, Misra M, Atrey PK (2016) A survey and classification of web phishing detection schemes. Secur Commun Netw 9:6266\u20136284. https:\/\/doi.org\/10.1002\/sec.1674","journal-title":"Secur Commun Netw"},{"key":"351_CR39","unstructured":"Sahoo D, Liu C, and Hoi SCH (2019) Malicious URL detection using machine learning: a survey. 1(1):37 pages."},{"key":"351_CR40","doi-asserted-by":"publisher","unstructured":"Meiss MR, Menczer F, Fortunato S, Flammini A, and Vespignani A (2008) Ranking web sites with real user traffic. In: Proceedings of the 2008 International Conference on Web Search and Data Mining (WSDM' 08). Association for Computing Machinery, New York, NY, USA, p 65\u201376. https:\/\/doi.org\/10.1145\/1341531.1341543","DOI":"10.1145\/1341531.1341543"},{"key":"351_CR41","doi-asserted-by":"publisher","unstructured":"Althobaiti K, Rummani G and Vaniea K (2049). A Review of Human- and Computer-Facing URL Phishing Features. In: IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Stockholm. Sweden. (August 2019). p 182\u2013191. https:\/\/doi.org\/10.1109\/EuroSPW.2019.00027","DOI":"10.1109\/EuroSPW.2019.00027"},{"key":"351_CR42","unstructured":"PhishTank. An anti-phishing site: phishing dataset (2019). http:\/\/www.phishtank.com"},{"key":"351_CR43","unstructured":"IsItPhishing. Anti phishing tools and information (2019). http:\/\/www.isitphishing.org"},{"key":"351_CR44","unstructured":"Enron email dataset (2019). https:\/\/www.cs.cmu.edu\/~.\/enron"},{"key":"351_CR45","unstructured":"Millersmiles sam report (2019). http:\/\/www.millersmiles.co.uk\/archives.php"},{"key":"351_CR46","unstructured":"Tumblr-targeted email attacks (2019). http:\/\/targetedemailattacks.tumblr.com"},{"key":"351_CR47","unstructured":"Alexa. Top sites service (2019). https:\/\/www.alexa.com\/topsites"},{"key":"351_CR48","unstructured":"StuffGate. Free online website analyzer (2019). http:\/\/stuffgate.com\/stuff\/website\/top-1000-sites"},{"key":"351_CR49","doi-asserted-by":"publisher","unstructured":"Garera S, Provos N, Chew M, and Rubin AD (2007) A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on Recurring malcode (WORM' 07). Association for Computing Machinery, New York, NY, USA, p 1\u20138. https:\/\/doi.org\/10.1145\/1314389.1314391","DOI":"10.1145\/1314389.1314391"},{"key":"351_CR50","doi-asserted-by":"crossref","unstructured":"Basnet RB, Doleck T (2015) Towards developing a tool to detect phishing urls: A machine learning approach. In: Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on (pp. 220\u2013223). IEEE.","DOI":"10.1109\/CICT.2015.63"},{"key":"351_CR51","doi-asserted-by":"crossref","unstructured":"Tan CL, Chiew KL et al. (2017) Phishing webpage detection using weighted url tokens for identity keywords retrieval. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (pp. 133\u2013139). Springer.","DOI":"10.1007\/978-981-10-1721-6_15"},{"key":"351_CR52","doi-asserted-by":"crossref","unstructured":"Chang EH, Chiew KL, Tiong WK et al. (2013) Phishing detection via identification of website identity. In: IT Convergence and Security (ICITCS), 2013 International Conference on (pp. 1\u20134). IEEE.","DOI":"10.1109\/ICITCS.2013.6717870"},{"key":"351_CR53","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2015.07.006","volume":"54","author":"KL Chiew","year":"2015","unstructured":"Chiew KL, Chang EH, Sze SN, Tiong WK (2015) Utilisation of website logo for phishing detection. Comput Secur 54:16\u201326. https:\/\/doi.org\/10.1016\/j.cose.2015.07.006","journal-title":"Comput Secur"},{"key":"351_CR54","doi-asserted-by":"crossref","unstructured":"Prakash P, Kumar M, Kompella RR, and Gupta M (2010) Phishnet: predictive blacklisting to detect phishing attacks. In: INFOCOM, 2010 Proceedings IEEE.","DOI":"10.1109\/INFCOM.2010.5462216"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-021-00351-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10799-021-00351-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-021-00351-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T12:42:09Z","timestamp":1665664929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10799-021-00351-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["351"],"URL":"https:\/\/doi.org\/10.1007\/s10799-021-00351-7","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"26 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}