{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:03Z","timestamp":1740181563591,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01544-9","type":"journal-article","created":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T03:03:58Z","timestamp":1671851038000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Phishing Website Detection as a Website Comparing Problem"],"prefix":"10.1007","volume":"4","author":[{"given":"Minh-Khoi","family":"Le-Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tri-Chan-Hung","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh-Thuan","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Hoa","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Long-Phuoc","family":"T\u00f4n","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9910-6387","authenticated-orcid":false,"given":"Khuong","family":"Nguyen-An","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,24]]},"reference":[{"key":"1544_CR1","doi-asserted-by":"publisher","unstructured":"Le-Nguyen M, Nguyen T, Le D, Nguyen V, T\u00f4n L, Nguyen-An K. Hunting phishing websites using a hybrid fuzzy-semantic-visual approach. In: 15th international conference on advanced computing and applications, ACOMP. Ho Chi Minh City, Vietnam: IEEE; 2021. p. 38\u201345 https:\/\/doi.org\/10.1109\/ACOMP53746.2021.00012.","DOI":"10.1109\/ACOMP53746.2021.00012"},{"key":"1544_CR2","doi-asserted-by":"publisher","unstructured":"Feroz MN, Mengel S. Phishing URL detection using URL ranking. In: IEEE international congress on big data. New York City, NY, USA: IEEE Computer Society; 2015. p. 635\u2013638. https:\/\/doi.org\/10.1109\/BigDataCongress.2015.97.","DOI":"10.1109\/BigDataCongress.2015.97"},{"key":"1544_CR3","doi-asserted-by":"publisher","unstructured":"Fukushima Y, Hori Y, Sakurai K. Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration. In: 10th international conference on trust, security and privacy in computing and communications - TrustCom. Changsha, China: IEEE Computer Society; 2011. p. 352\u2013361. https:\/\/doi.org\/10.1109\/TrustCom.2011.46.","DOI":"10.1109\/TrustCom.2011.46"},{"key":"1544_CR4","unstructured":"F\u00e9legyh\u00e1zi M, Kreibich C, Paxson V. On the potential of proactive domain blacklisting. In: 3rd workshop on large-scale exploits and emergent threats - LEET. San Jose, CA, USA: USENIX Association; 2010."},{"key":"1544_CR5","doi-asserted-by":"publisher","unstructured":"Aburrous M, Hossain MA, Thabatah F, Dahal K. Intelligent phishing website detection system using fuzzy techniques. In: 3rd international conference on information and communication technologies: from theory to applications. 2008. p. 1\u20136. https:\/\/doi.org\/10.1109\/ICTTA.2008.4530019.","DOI":"10.1109\/ICTTA.2008.4530019"},{"key":"1544_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.7753\/IJCATR0603.1003","volume":"6","author":"N Jayakanthan","year":"2017","unstructured":"Jayakanthan N, Ramani AV. Classification model to detect malicious URL via behaviour analysis. Int J Comput Appl Technol Res. 2017;6:133\u201340. https:\/\/doi.org\/10.7753\/IJCATR0603.1003.","journal-title":"Int J Comput Appl Technol Res"},{"key":"1544_CR7","doi-asserted-by":"crossref","unstructured":"Dong Z, Kapadia A, Blythe J, Camp LJ. Beyond the lock icon: real-time detection of phishing websites using public key certificates. In: APWG symposium on electronic crime research - eCrime. Barcelona, Spain: IEEE Computer Society; 2015. p. 1\u201312.","DOI":"10.1109\/ECRIME.2015.7120795"},{"issue":"2","key":"1544_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang G, Hong JI, Ros\u00e9 CP, Cranor LF. CANTINA+: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur. 2011;14(2):21\u201312128. https:\/\/doi.org\/10.1145\/2019599.2019606.","journal-title":"ACM Trans Inf Syst Secur"},{"key":"1544_CR9","doi-asserted-by":"publisher","unstructured":"Rosiello APE, Kirda E, Kruegel C, Ferrandi F. A layout-similarity-based approach for detecting phishing pages. In: Third international conference on security and privacy in communication networks and the workshops - SecureComm. Nice, France: IEEE Computer Society; 2007. p. 454\u2013463. https:\/\/doi.org\/10.1109\/SECCOM.2007.4550367.","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"1544_CR10","doi-asserted-by":"publisher","unstructured":"Invernizzi L, Thomas K, Kapravelos A, Comanescu O, Picod JM, Bursztein E. Cloak of visibility: detecting when machines browse a different web. In: Symposium on security and privacy. San Jose, CA, USA: IEEE Computer Society; 2016. p. 743\u2013758. https:\/\/doi.org\/10.1109\/SP.2016.50.","DOI":"10.1109\/SP.2016.50"},{"key":"1544_CR11","doi-asserted-by":"publisher","unstructured":"Ford S, Cova M, Kruegel C, Vigna G. Analyzing and detecting malicious flash advertisements. In: 25th annual computer security applications conference - ACSAC. Honolulu, Hawaii, USA: IEEE Computer Society; 2009. p. 363\u2013372. https:\/\/doi.org\/10.1109\/ACSAC.2009.41.","DOI":"10.1109\/ACSAC.2009.41"},{"key":"1544_CR12","doi-asserted-by":"publisher","unstructured":"Zarras A, Kapravelos A, Stringhini G, Holz T, Kruegel C, Vigna G. The dark alleys of madison avenue: understanding malicious advertisements. In: Proceedings of the 2014 internet measurement conference - IMC. Vancouver, BC, Canada: ACM; 2014. p. 373\u2013380. https:\/\/doi.org\/10.1145\/2663716.2663719.","DOI":"10.1145\/2663716.2663719"},{"key":"1544_CR13","doi-asserted-by":"publisher","unstructured":"Ma J, Saul LK, Savage S, Voelker GM. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. Paris, France: ACM; 2009. p. 1245\u20131254. https:\/\/doi.org\/10.1145\/1557019.1557153.","DOI":"10.1145\/1557019.1557153"},{"key":"1544_CR14","doi-asserted-by":"publisher","unstructured":"Mishra A, Gupta BB. Hybrid solution to detect and filter zero-day phishing attacks. In: Proceedings of the 2nd international conference on emerging research in computing, information, communication and applications. 2014. https:\/\/doi.org\/10.1155\/2017\/5421046.","DOI":"10.1155\/2017\/5421046"},{"key":"1544_CR15","doi-asserted-by":"crossref","unstructured":"Kumar J, Santhanavijayan A, Janet B, Rajendran B, Bindhumadhava BS. phishing website classification and detection using machine learning. In: International conference on computer communication and informatics (ICCCI). Tamilnadu, India: IEEE; 2020. p. 1\u20136.","DOI":"10.1109\/ICCCI48352.2020.9104161"},{"key":"1544_CR16","doi-asserted-by":"publisher","unstructured":"Nakamura A, Dobashi F. Proactive phishing sites detection. In: IEEE\/WIC\/ACM international conference on web intelligence. Thessaloniki, Greece: ACM; 2019. p. 443\u2013448. https:\/\/doi.org\/10.1145\/3350546.3352565.","DOI":"10.1145\/3350546.3352565"},{"key":"1544_CR17","doi-asserted-by":"publisher","unstructured":"Wu C-Y, Kuo C-C, Yang C-S. A phishing detection system based on machine learning. In: International conference on intelligent computing and its emerging applications (ICEA). Tainan, Taiwan: IEEE; 2019. p. 28\u201332. https:\/\/doi.org\/10.1109\/ICEA.2019.8858325.","DOI":"10.1109\/ICEA.2019.8858325"},{"key":"1544_CR18","doi-asserted-by":"publisher","unstructured":"Zhang X, Zeng Y, Jin X, Yan Z, Geng G. Boosting the phishing detection performance by semantic analysis. In: International conference on big data. Boston, MA, USA: IEEE; 2017. p. 1063\u20131070. https:\/\/doi.org\/10.1109\/BigData.2017.8258030.","DOI":"10.1109\/BigData.2017.8258030"},{"issue":"6","key":"1544_CR19","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1002\/sec.1045","volume":"8","author":"G Geng","year":"2015","unstructured":"Geng G, Lee X, Zhang Y. Combating phishing attacks via brand identity and authorization features. Secur Commun Netw. 2015;8(6):888\u201398. https:\/\/doi.org\/10.1002\/sec.1045.","journal-title":"Secur Commun Netw"},{"key":"1544_CR20","doi-asserted-by":"publisher","unstructured":"Ahmed AA, Abdullah NA. Real time detection of phishing websites. In: IEEE 7th annual information technology, electronics and mobile communication conference - IEMCON. Vancouver, BC, Canada: IEEE; 2016. p. 1\u20136. https:\/\/doi.org\/10.1109\/IEMCON.2016.7746247.","DOI":"10.1109\/IEMCON.2016.7746247"},{"key":"1544_CR21","doi-asserted-by":"publisher","unstructured":"Pan Y, Ding X. Anomaly based web phishing page detection. In: 22nd annual computer security applications conference - ACSAC. Miami Beach, Florida, USA: IEEE Computer Society; 2006. p. 381\u2013392. https:\/\/doi.org\/10.1109\/ACSAC.2006.13.","DOI":"10.1109\/ACSAC.2006.13"},{"key":"1544_CR22","doi-asserted-by":"publisher","unstructured":"Pennington J, Socher R, Manning CD. Glove: global vectors for word representation. In: Proceedings of the conference on empirical methods in natural language processing. Doha, Qatar: ACL; 2014. p. 1532\u20131543. https:\/\/doi.org\/10.3115\/v1\/d14-1162.","DOI":"10.3115\/v1\/d14-1162"},{"key":"1544_CR23","first-page":"38","volume":"3","author":"S Lassri","year":"2019","unstructured":"Lassri S, Benlahmar EH, Tragha A. Machine learning for web page classification: a survey. Int J Inf Sci Technol. 2019;3:38\u201350.","journal-title":"Int J Inf Sci Technol"},{"key":"1544_CR24","doi-asserted-by":"publisher","unstructured":"Wu P, Zhao J. Distributed representations of html page. In: IEEE 2nd international conference on power, electronics and computer applications - ICPECA. Shenyang, China: IEEE; 2022. p. 160\u2013164. https:\/\/doi.org\/10.1109\/ICPECA53709.2022.9719099.","DOI":"10.1109\/ICPECA53709.2022.9719099"},{"issue":"4","key":"1544_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600\u201312. https:\/\/doi.org\/10.1109\/TIP.2003.819861.","journal-title":"IEEE Trans Image Process"},{"key":"1544_CR26","doi-asserted-by":"publisher","unstructured":"Anand A, Gorde K, Moniz JRA, Park N, Chakraborty T, Chu B. Phishing URL detection with oversampling based on text generative adversarial networks. In: IEEE international conference on big data, Seattle, WA, USA: IEEE; 2018. p. 1168\u20131177. https:\/\/doi.org\/10.1109\/BigData.2018.8622547.","DOI":"10.1109\/BigData.2018.8622547"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01544-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01544-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01544-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T11:44:56Z","timestamp":1678448696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01544-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,24]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["1544"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01544-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,12,24]]},"assertion":[{"value":"15 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"122"}}