{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:52Z","timestamp":1759091752740},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T00:00:00Z","timestamp":1308096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s13278-011-0031-y","type":"journal-article","created":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T20:45:44Z","timestamp":1308084344000},"page":"5-16","source":"Crossref","is-referenced-by-count":14,"title":["Profiling phishing activity based on hyperlinks extracted from phishing emails"],"prefix":"10.1007","volume":"2","author":[{"given":"John","family":"Yearwood","sequence":"first","affiliation":[]},{"given":"Musa","family":"Mammadov","sequence":"additional","affiliation":[]},{"given":"Dean","family":"Webb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,15]]},"reference":[{"issue":"2","key":"31_CR29","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1080\/1068316031000116265","volume":"9","author":"L Alison","year":"2003","unstructured":"Alison L, Smith M, Eastman O, Rainbow L (2003) Toulmin\u2019s philosophy of argument and its relevance to offender profiling. Psychol Crime Law 9(2):173\u2013183","journal-title":"Psychology, Crime and Law"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Bhattacharyya P, Garg A, Wu SF (2010) Analysis of user keyword similarity in online social networks. Social Netw Anal Min. doi: 10.1007\/s13278-010-0006-4","DOI":"10.1007\/s13278-010-0006-4"},{"key":"31_CR7","unstructured":"Brandjacking index (2009) Markmonitor.com, Spring 2009. http:\/\/www.markmonitor.com\/download\/bji\/BrandjackingIndex-Spring2009.pdf"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Castle T, Hensley C (2002) Serial killers with military experience: applying learning theory to serial murder. International J Offender Ther Comp Criminol 46:453\u2013465","DOI":"10.1177\/0306624X02464007"},{"key":"31_CR12","unstructured":"Chandrasekaran M, Karayanan K, Upadhyaya S (2006) Towards phishing e-mail detection based on their structural properties, In: Proceedings of the New York State Cyber Security Conference"},{"key":"31_CR13","unstructured":"Chau D (2005) Prototyping a lightweight trust architecture to fight phishing, MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep., final Report. http:\/\/groups.csail.mit.edu\/cis\/crypto\/projects\/antiphishing\/"},{"key":"31_CR21","unstructured":"Clark R (1993) Profiling: a hidden challenge to the regulation of data surveillance. J Inf Sci 4(2)"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Cortez P, Correia A, Sousa P, Rocha M, Rio M, Perner P (2010) Spam Email Filtering Using Network-Level Properties. In: Proceedings, Advances in Data Mining Applications and Theoretical Aspects. 10th Industrial Conference, ICDM 2010. Berlin, Germany","DOI":"10.1007\/978-3-642-14400-4_37"},{"key":"31_CR31","unstructured":"Customer profiling survey solution enabling cross and up selling (2007) Confirmit. http:\/\/www.confirmit.com\/home.aspx"},{"key":"31_CR1","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1057\/dbm.2008.8","volume":"15","author":"Doyle S.","year":"2008","unstructured":"Doyle S (2008) Social network analysis in the telco sector marketing applications. J Database Mark Cust Strategy Manag 15:130\u2013134","journal-title":"Journal of Database Marketing and Customer Strategy Management"},{"key":"31_CR6","unstructured":"Emigh A (2005) Online identity theft: Phishing technilogy, chokepoints and countermeasures, Radix Labs, Tech. Rep., retrieved from Anti-Phishing Working Group. http:\/\/www.antiphishing.org\/resources.html"},{"key":"31_CR27","unstructured":"FBI method of profiling (2006) Wikipedia, January 2006, retrieved June 10, 2011. http:\/\/en.wikipedia.org\/wiki\/FBI_method_of_profiling"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Fette I, Sadeh N, Tomasic A (2007) Learning to detect phishing emails. In: WWW \u201907: Proceedings of the 16th international conference on the World Wide Web. New York, NY, USA. ACM Press, New York, pp 649\u2013656","DOI":"10.1145\/1242572.1242660"},{"key":"31_CR39","unstructured":"Freund Y, Schapire R (1999) A short introduction to boosting, J Jpn Soc Artif Intell 14(5):771\u2013780"},{"key":"31_CR3","unstructured":"Hanneman RA, Shelton CR (2011) Applying modality and equivalence concepts to pattern finding in social process-produced data. Soc Netw Anal Min 1(1):59\u201372"},{"key":"31_CR25","unstructured":"Interactive investor profile tool (2011) Southside Bank: Trust & Investment Services Group, retrieved June 10, 2011. http:\/\/www.southsidetrust.com\/tool.html"},{"key":"31_CR32","unstructured":"InterNIC : Whois search InterNIC\u2014Public information Regarding Internel Domain Name Registration Services. http:\/\/www.internic.net\/whois.html"},{"key":"31_CR24","unstructured":"Investor profiles (2011) The National Mutual Life Association of Australasia Limited, retrieved June 10, 2011. http:\/\/www.axafreedom.com.au\/freedom\/freedom.nsf\/content\/InvestorProfiles"},{"key":"31_CR19","unstructured":"Jakobsson M, Young A (2005) Distributed phishing attacks, Cryptology ePrint Archive, Report 2005\/091. http:\/\/eprint.iacr.org\/"},{"key":"31_CR40","doi-asserted-by":"crossref","unstructured":"Joachims TJ (2002) Learning to classify text using support vector machines: methods, theory and algorithms. Kluwer Academic Publishers, Dordrecht","DOI":"10.1007\/978-1-4615-0907-3"},{"key":"31_CR11","unstructured":"Juels A, Jakobsson M, Jagatic TN (2006) Cache cookies for browser authentication (extended abstract), In: SP \u201906: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P\u201906). minus 0.4em Washington, DC, USA. IEEE Computer Society, NW, pp 301\u2013305"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Mammadov M, Rubinov A, Yearwood J (2007a) The study of drug-reaction relationships using global optimization techniques. Optim Methods Softw 22(1):99\u2013126","DOI":"10.1080\/10556780600883684"},{"key":"31_CR18","unstructured":"Mammadov M, Yearwood J, Banarjee A (2007b) Classification on shorter featured and multi-label datasets. In: Proceedings of the 7th International Conference on Optimization: Techniques and Applications (ICOTA07), December 12\u201315, Kobe, Japan"},{"key":"31_CR22","unstructured":"Market basket analysis (2011) Information drivers, retrieved June 10, 2011. http:\/\/www.information-drivers.com\/market_basket_analysis.php"},{"key":"31_CR23","unstructured":"Petrovic D (2007) Analysis of consumer behaviour online, Analogik.com, Tech. Rep., retrieved June 10, 2011. http:\/\/analogik.com\/articles\/227\/analysis-of-consumer-behaviour-online"},{"key":"31_CR34","unstructured":"Ripe database RIPE Network Coordination Centre. http:\/\/www.ripe.net\/index.html"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Rosen D, Barnett GA, Kim JH (2011) Social networks and online environments: when science and practice co-evolve. Soc Netw Anal Min 1(1):27\u201342","DOI":"10.1007\/s13278-010-0011-7"},{"issue":"2\/3","key":"31_CR37","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1023\/A:1007649029923","volume":"39","author":"R Schapire","year":"2000","unstructured":"Schapire R, Singer Y (2000) BoosTexter: a boosting-based system for text categorization. Mach Learn 39(2\/3):135\u2013168","journal-title":"Machine Learning"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Sebastiani F (2002) Machine learning in automated text categorization. IACM Comput Surv (CSUR) 34(1). doi: 10.1145\/505282.505283","DOI":"10.1145\/505282.505283"},{"key":"31_CR5","unstructured":"Stewart J (2003) DNS cache poisoning\u2014the next generation, Secure Works, Tech. Rep. http:\/\/www.secureworks.com\/research\/articles"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Tang L, Rajan S, Narayanan VK (2009) Large scale multi-label classification via metalabeler. In: Proceedings of the 18th international conference on World Wide Web, ACM Press, New York, pp 211\u2013220","DOI":"10.1145\/1526709.1526738"},{"key":"31_CR33","unstructured":"The APNIC whois Asia Pacific Network Information Center. http:\/\/wq.apnic.net\/apnic-bin\/whois.pl"},{"issue":"3","key":"31_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas G, Katakis I (2007) Multi-label classification: an overview. Int J Data Warehous Min 3(3):1\u201313","journal-title":"International Journal of Data Warehousing and Mining"},{"key":"31_CR28","unstructured":"Webb D (2011) A free and comprehensive guide to the world of forensic psychology, All About Forensic Psychology, retrieved June, 2011. http:\/\/student-guide-to-forensic-psychology.blogspot.com\/"},{"key":"31_CR35","unstructured":"Webb D, Yearwood J, Vamplew P, Liping M, Ofoghi B, Kelarev A (2009) Applying clustering and ensemble clustering approaches to phishing profiling. In: Proceedings of AusDM 2009, The Australasian Data Mining Conference 2009. CRPIT"},{"key":"31_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu X, et\u00a0al (2008) Top 10 algorithms in data mining. Knowl Inf Sys 14:1\u201337","journal-title":"Knowledge and Information Systems"},{"key":"31_CR10","unstructured":"Wu M, Miller R, Little G (2006) Preventing phishing attacks by revealing user intentions. In: Symposium on Usable Privacy and Security (SOUPS)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Xu KS, Kliger MM, Yilun C, Woolf PJ, Hero A (2009) Revealing social networks of spammers through spectral clustering. In: Proceedings of the IEEE International Conference on Communications. Dresden, Germany. doi: 10.1109\/ICC.2009.5199418","DOI":"10.1109\/ICC.2009.5199418"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Yang Y (1999) A re-examination of text categorization methods. In: Proceedings of SIGIR-99, 22nd ACM International Conference on Research and Development in Information Retrieval","DOI":"10.1145\/312624.312647"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0031-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-011-0031-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0031-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T18:39:55Z","timestamp":1560278395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-011-0031-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,15]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1007\/s13278-011-0031-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,15]]}}}