{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T17:35:34Z","timestamp":1777484134338,"version":"3.51.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T00:00:00Z","timestamp":1467763200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11277-016-3451-1","type":"journal-article","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T06:17:47Z","timestamp":1467785867000},"page":"2331-2361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining"],"prefix":"10.1007","volume":"94","author":[{"given":"R.","family":"Aravindhan","sequence":"first","affiliation":[]},{"given":"R.","family":"Shanmugalakshmi","sequence":"additional","affiliation":[]},{"given":"K.","family":"Ramya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,6]]},"reference":[{"key":"3451_CR1","unstructured":"https:\/\/www.ipass.com\/press-releases\/the-global-public-wi-fi-network-grows-to-50-million-worldwide-wi-fi-hotspots\/ ."},{"key":"3451_CR2","unstructured":"http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS41061416 ."},{"key":"3451_CR3","unstructured":"http:\/\/www.idc.com\/prodserv\/smartphone-market-share.jsp ."},{"key":"3451_CR4","unstructured":"http:\/\/krebsonsecurity.com\/2015\/08\/fbi-1-2b-lost-to-business-email-scams\/ ."},{"key":"3451_CR5","unstructured":"https:\/\/blog.cloudmark.com\/2016\/01\/13\/survey-spear-phishing-a-top-security-concern-to-enterprises\/ ."},{"key":"3451_CR6","unstructured":"http:\/\/seattlecentral.edu\/faculty\/ymoh\/mic265\/WiFi\/WiFi.html ."},{"key":"3451_CR7","unstructured":"computer.howstuffworks.com\/wireless-network.htm."},{"key":"3451_CR8","unstructured":"http:\/\/www.linksys.com\/us\/support-article?articleNum=134478 ."},{"key":"3451_CR9","unstructured":"http:\/\/volcano.oregonstate.edu\/what-is-a-hot-spot ."},{"key":"3451_CR10","unstructured":"Gopinath, K. N., & Chaskar, H. A quick reference to Rogue AP security threat, Rogue AP detection and mitigation. AirTight Networks www.AirTightNetworks.com ."},{"key":"3451_CR11","unstructured":"https:\/\/technet.microsoft.com\/en-in\/library\/cc787921(v=ws.10).aspx ."},{"key":"3451_CR12","doi-asserted-by":"crossref","unstructured":"Aydin, M., &Baykal, N. (2015). Feature extraction and classification phishing websites based on URL. In 2015 IEEE Conference on Communications and Network Security (CNS), pp. 769\u2013770.","DOI":"10.1109\/CNS.2015.7346927"},{"key":"3451_CR13","doi-asserted-by":"crossref","unstructured":"Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel Phishing classification based on URL features. In 2011 IEEE GCC Conference and Exhibition (GCC), pp. 221\u2013224.","DOI":"10.1109\/IEEEGCC.2011.5752505"},{"key":"3451_CR14","unstructured":"Mallik, S., & Mukhopadhyay, A. RANWAR: Rank-based weighted association rule mining from gene expression and methylation data. IEEE Transactions on Nano Bioscience."},{"key":"3451_CR15","unstructured":"Soltani, A., & Akbarzadeh-T, M.-R. Confabulation-inspired association rule mining for rare and frequent itemsets. IEEE Transactions on Neural Networks and Learning Systems."},{"key":"3451_CR16","unstructured":"Phish tank. http:\/\/www.phishtank.com\/ . Accessed on October 26, 2009."},{"issue":"2","key":"3451_CR17","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MSP.2006.47","volume":"4","author":"B Kesler","year":"2006","unstructured":"Kesler, B., Drinan, H., & Fontaine, N. (2006). News briefs. IEEE Security and Privacy, 4(2), 8\u201313.","journal-title":"IEEE Security and Privacy"},{"key":"3451_CR18","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., & Rubin, A. D. (2007). A framework for detection and measurement of phishing attacks. In WORM \u201807: Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 1\u20138, New York, NY, USA, 2007. ACM.","DOI":"10.1145\/1314389.1314391"},{"key":"3451_CR19","doi-asserted-by":"crossref","unstructured":"Pan, Y., & Ding, X. (2006). Anomaly based web phishing page detection. In ACSAC \u201806: Proceedings of the 22nd Annual Computer Security-Applications Conference, pp. 381\u2013392, Washington, DC, USA, 2006. IEEE Computer Society.","DOI":"10.1109\/ACSAC.2006.13"},{"key":"3451_CR20","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., & Shelly, D. (2010). GoldPhish: Using images for content-based phishing analysis. In The fifth international conference on internet monitoring and protection, Virginia Polytechnic Institute and State University, Blacksburg, VA 24060, USA, 2010.","DOI":"10.1109\/ICIMP.2010.24"},{"key":"3451_CR21","unstructured":"Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos, E. P. Detecting social network profile cloning. Foundation for Research and Technology Hellas\u2014Institute of Computer Science."},{"key":"3451_CR22","doi-asserted-by":"crossref","unstructured":"Khonji, M., Jones, A., & Iraqi, Y. (2011). A novel phishing classification based on url features. In 2011 IEEE GCC conference and exhibition (GCC), Dubai, United Arab Emirates, 2011.","DOI":"10.1109\/IEEEGCC.2011.5752505"},{"key":"3451_CR23","unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L. F., Hang, J., & Zhang, C. (2009). An empirical analysis of phishing blacklists. http:\/\/ceas.cc\/2009\/papers\/ceas2009-paper-32.pdf . Accessed July 2010."},{"key":"3451_CR24","doi-asserted-by":"crossref","unstructured":"Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010a). Predicting phishing websites using classification mining techniques with experimental case studies. In Seventh International Conference on Information Technology, IEEE Conf, LasVegas, Nevada, USA, (pp. 176\u2013181).","DOI":"10.1109\/ITNG.2010.117"},{"key":"3451_CR25","doi-asserted-by":"crossref","unstructured":"Aburrous, M., Hossain, M. A., Dahal, K., & Thatah, F. (2010b). Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37(12), 7913\u20137921","DOI":"10.1016\/j.eswa.2010.04.044"},{"key":"3451_CR26","unstructured":"Shahriar, H., Zulkernine, M. (2010). Trustworthiness testing of phishing websites: A behavior model-based approach. In Future Generation Computer Systems. School of Computing, Queen\u2018s University, Kingston, Canada."},{"key":"3451_CR27","doi-asserted-by":"crossref","first-page":"4697","DOI":"10.1016\/j.eswa.2013.02.009","volume":"40","author":"PA Barraclough","year":"2013","unstructured":"Barraclough, P. A., Hossain, M. A., Tahir, M. A., Sexton, G., & Aslam, N. (2013). Intelligent phishing detection and protection scheme for online transactions. Expert Systems with Applications, 40, 4697\u20134706.","journal-title":"Expert Systems with Applications"},{"key":"3451_CR28","unstructured":"http:\/\/truehackkers.blogspot.in\/2014\/11\/hack-like-pro-how-to-spoof-dns-on-lan.html ."},{"key":"3451_CR29","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imieli\u0144ski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In SIGMOD \u201893 Proceedings of the 1993 ACM SIGMOD international conference on Management of data.","DOI":"10.1145\/170035.170072"},{"key":"3451_CR30","unstructured":"Abdelhamid, N., Ayesh, A., & Thabtah, F. (2013) Associative classification mining for website phishing classification. In Proceedings of the ICAI \u20182013, pp. 687\u2013695, USA."},{"key":"3451_CR31","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.asoc.2009.11.023","volume":"11","author":"RJ Kuoa","year":"2011","unstructured":"Kuoa, R. J., Chao, C. M., & Chiuc, Y. T. (2011). Application of particle swarm optimization to association rule mining. Applied Soft Computing, 11, 326\u2013336.","journal-title":"Applied Soft Computing"},{"key":"3451_CR32","unstructured":"Wur, S.-Y., & Leu, Y. (1999). An effective boolean algorithm for mining association rules in large databases. In Proceeding DASFAA \u201899 Proceedings of the sixth international conference on database systems for advanced applications, pp. 179\u2013186."},{"key":"3451_CR33","unstructured":"Kung, S. H. (2002). Applying genetic algorithm and weight item to association rule. Master Thesis, Department of Industrial Engineering and Management, Yuan Ze University, Taiwan."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3451-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3451-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3451-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3451-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T19:30:13Z","timestamp":1568143813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3451-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,6]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3451"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3451-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,6]]}}}