{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:14Z","timestamp":1740181574587,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02644-4","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T15:05:50Z","timestamp":1710428750000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PRAY So You Don\u2019t Become Prey"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0847-808X","authenticated-orcid":false,"given":"Eashwar","family":"Sivakumar","sequence":"first","affiliation":[]},{"given":"Kiran Jot","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Paras","family":"Chawla","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"2644_CR1","unstructured":"University Grand Commission UGC CARE\u2014List of cloned journals Group I. Available https:\/\/ugccare.unipune.ac.in\/Apps1\/User\/Web\/CloneJournals Accessed 5 Aug 2023."},{"key":"2644_CR2","unstructured":"University Grand Commission UGC CARE\u2014List of cloned journals Group II. Available: https:\/\/ugccare.unipune.ac.in\/Apps1\/User\/Web\/CloneJournalsGroupII. Accessed 5 Aug 2023."},{"key":"2644_CR3","unstructured":"University Grand Commission UGC CARE\u2014List of cloned journals Group I. Available: https:\/\/ugccare.unipune.ac.in\/Apps1\/User\/Web\/CloneJournalsNew. Accessed 5 Aug 2023."},{"issue":"6","key":"2644_CR4","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1590\/1516-3180.2018.0370160919","volume":"137","author":"Z Asim","year":"2019","unstructured":"Asim Z, Sorooshian S. Clone journals: a threat to medical research. Sao Paulo Med J. 2019;137(6):550\u20131. https:\/\/doi.org\/10.1590\/1516-3180.2018.0370160919.","journal-title":"Sao Paulo Med J"},{"key":"2644_CR5","doi-asserted-by":"publisher","DOI":"10.5937\/GeoPan1502073J","author":"M Jalalian","year":"2015","unstructured":"Jalalian M, Dadkhah M. The full story of 90 hijacked journals from August 2011 to June 2015. Geogr Pannon. 2015. https:\/\/doi.org\/10.5937\/GeoPan1502073J.","journal-title":"Geogr Pannon"},{"issue":"3","key":"2644_CR6","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s12024-016-9785-x","volume":"12","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah M, Maliszewski T, Teixeira da Silva JA. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics. Forensic Sci Med Pathol. 2016;12(3):353\u201362. https:\/\/doi.org\/10.1007\/s12024-016-9785-x.","journal-title":"Forensic Sci Med Pathol"},{"issue":"6","key":"2644_CR7","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1093\/asj\/sjw026","volume":"36","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah M, Borchardt G. Hijacked journals: an emerging challenge for scholarly publishing. Aesthetic Surg J. 2016;36(6):739\u201341. https:\/\/doi.org\/10.1093\/asj\/sjw026.","journal-title":"Aesthetic Surg J"},{"issue":"5","key":"2644_CR8","doi-asserted-by":"publisher","first-page":"102388","DOI":"10.1016\/j.acalib.2021.102388002E","volume":"47","author":"S Moussa","year":"2021","unstructured":"Moussa S. A \u2018Trojan horse\u2019 in the reference lists: Citations to a hijacked journal in SSCI-indexed marketing journals. J Acad Librariansh. 2021;47(5):102388. https:\/\/doi.org\/10.1016\/j.acalib.2021.102388002E.","journal-title":"J Acad Librariansh"},{"issue":"6","key":"2644_CR9","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.tips.2016.04.002","volume":"37","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah M, Maliszewski T, Jazi MD. Characteristics of hijacked journals and predatory publishers: our observations in the academic world. Trends Pharmacol Sci. 2016;37(6):415\u20138. https:\/\/doi.org\/10.1016\/j.tips.2016.04.002.","journal-title":"Trends Pharmacol Sci"},{"issue":"1","key":"2644_CR10","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11948-015-9747-9","volume":"23","author":"A Asadi","year":"2017","unstructured":"Asadi A, Rahbar N, Asadi M, Asadi F, Khalili Paji K. Online-based approaches to identify real journals and publishers from hijacked ones. Sci Eng Ethics. 2017;23(1):305\u20138. https:\/\/doi.org\/10.1007\/s11948-015-9747-9.","journal-title":"Sci Eng Ethics"},{"issue":"1","key":"2644_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s12664-020-01129-5","volume":"40","author":"S Singhal","year":"2021","unstructured":"Singhal S, Kalra BS. Publication ethics: Role and responsibility of authors. Indian J Gastroenterol. 2021;40(1):65\u201371. https:\/\/doi.org\/10.1007\/s12664-020-01129-5.","journal-title":"Indian J Gastroenterol"},{"issue":"2","key":"2644_CR12","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/s12109-017-9507-6","volume":"33","author":"M Negahdary","year":"2017","unstructured":"Negahdary M. Simultaneous submission of a manuscript to more than one journal: challenges and solutions. Publ Res Q. 2017;33(2):188\u201391. https:\/\/doi.org\/10.1007\/s12109-017-9507-6.","journal-title":"Publ Res Q"},{"key":"2644_CR13","doi-asserted-by":"publisher","unstructured":"Sivakumar E, Chawla P, Ganesan G (2022) Challenges in scholarly communication and scientific publication\u2014present scenario and opportunities through blockchain solutions. In: The 5th International Conference on Future Networks and Distributed Systems, p. 496\u2013503. doi: https:\/\/doi.org\/10.1145\/3508072.3508174.","DOI":"10.1145\/3508072.3508174"},{"key":"2644_CR14","doi-asserted-by":"publisher","unstructured":"Khurana P, Ganesan G, Kumar, G, Sharma K (2023) A bibliometric analysis to unveil the impact of digital object identifiers (DOI) on bibliometric indicators in Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol. 421, p. 859\u2013869. doi: https:\/\/doi.org\/10.1007\/978-981-19-1142-2_67.","DOI":"10.1007\/978-981-19-1142-2_67"},{"issue":"2","key":"2644_CR15","doi-asserted-by":"publisher","first-page":"146","DOI":"10.5530\/jscires.11.2.16","volume":"11","author":"P Khurana","year":"2022","unstructured":"Khurana P, Ganesan G, Kumar G, Sharma K. A comparative analysis of unified informetrics with scopus and web of science. J Scientometr Res. 2022;11(2):146\u201354. https:\/\/doi.org\/10.5530\/jscires.11.2.16.","journal-title":"J Scientometr Res"},{"issue":"2","key":"2644_CR16","doi-asserted-by":"publisher","first-page":"234","DOI":"10.47709\/cnahpc.v3i2.1064","volume":"3","author":"MK Harahap","year":"2021","unstructured":"Harahap MK, Khairina N. Copyright protection of scientific works using digital watermarking by embedding DOI QR code. J Comput Netw Archit High Perform Comput. 2021;3(2):234\u201340. https:\/\/doi.org\/10.47709\/cnahpc.v3i2.1064.","journal-title":"J Comput Netw Archit High Perform Comput"},{"issue":"1","key":"2644_CR17","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.joi.2015.11.008","volume":"10","author":"J Gorraiz","year":"2016","unstructured":"Gorraiz J, Melero-Fuentes D, Gumpenberger C, Valderrama-Zuri\u00e1n JC. Availability of digital object identifiers (DOIs) in web of science and scopus. J Informet. 2016;10(1):98\u2013109. https:\/\/doi.org\/10.1016\/j.joi.2015.11.008.","journal-title":"J Informet"},{"key":"2644_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s11265-012-0684-4","volume":"71","author":"P Echeverr\u00eda","year":"2013","unstructured":"Echeverr\u00eda P, L\u00f3pez-Vallejo M. High performance FPGA-oriented Mersenne Twister Uniform Random Number Generator. J Sign Process Syst. 2013;71:105\u20139. https:\/\/doi.org\/10.1007\/s11265-012-0684-4.","journal-title":"J Sign Process Syst"},{"key":"2644_CR19","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11265-006-0014-9","volume":"47","author":"DB Thomas","year":"2007","unstructured":"Thomas DB, Luk W. High quality uniform random number generation using LUT Optimised State-transition Matrices. J VLSI Sign Process Syst Sign Image Video Technol. 2007;47:77\u201392. https:\/\/doi.org\/10.1007\/s11265-006-0014-9.","journal-title":"J VLSI Sign Process Syst Sign Image Video Technol"},{"key":"2644_CR20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22r1a","volume-title":"SP 800\u201322 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"LE Bassham","year":"2010","unstructured":"Bassham LE, et al. SP 800\u201322 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg: National Institute of Standards & Technology; 2010."},{"key":"2644_CR21","unstructured":"National Institute of Standards and Technology. \u201cFIPS-46: Data Encryption Standard (DES).\u201d Revised as FIPS 46\u20131:1988, FIPS 46\u20132:1993, FIPS 46\u20133:1999. 1979. Available: http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf. Accessed 27 Aug 2023."},{"key":"2644_CR22","unstructured":"National Institute of Standards and Technology. \u201cFIPS-197: Advanced Encryption Standard (AES)\u201d. 2001. Available: https:\/\/csrc.nist.gov\/pubs\/fips\/197\/final Accessed on 27 Aug 2023."},{"issue":"6","key":"2644_CR23","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;22(6):644\u201354. https:\/\/doi.org\/10.1109\/TIT.1976.1055638.","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"2644_CR24","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L. A method of obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120\u20136.","journal-title":"Commun ACM"},{"issue":"4","key":"2644_CR25","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory. 1985;31(4):469\u201372. https:\/\/doi.org\/10.1109\/TIT.1985.1057074.","journal-title":"IEEE Trans Inf Theory"},{"key":"2644_CR26","unstructured":"Rabin MO. Digitalized signatures and public-key functions as intractable as factorization. 1979. Available: https:\/\/dspace.mit.edu\/handle\/1721.1\/149499. Accessed on 27 Aug 2023."},{"key":"2644_CR27","doi-asserted-by":"crossref","unstructured":"Rivest R. The MD5 message-digest algorithm. 1992. Available: https:\/\/www.rfc-editor.org\/rfc\/rfc1321. Accessed on 27 Aug 2023.","DOI":"10.17487\/rfc1321"},{"key":"2644_CR28","unstructured":"National Institute of Standards and Technology. FIPS 180\u20131: Secure Hash Standard, April 1995. Available: https:\/\/csrc.nist.gov\/pubs\/fips\/180-1\/final. Accessed on 27 Aug 2023."},{"key":"2644_CR29","unstructured":"National Institute of Standards and Technology. FIPS 180\u20132 Secure Hash Standard. 2002. Available: https:\/\/csrc.nist.gov\/pubs\/fips\/180-2\/upd1\/final. Accessed on 27 Aug 2023"},{"key":"2644_CR30","unstructured":"National Institute of Standards and Technology. FIPS 202 Secure Hash Standard. 2015. Available: https:\/\/csrc.nist.gov\/pubs\/fips\/202\/final. Accessed on 27 Aug 2023]."},{"key":"2644_CR31","volume-title":"The hash function BLAKE","author":"J-P Aumasson","year":"2015","unstructured":"Aumasson J-P, Meier W, Phan RC-W, Henzen L. The hash function BLAKE. New York: Springer; 2015."},{"key":"2644_CR32","unstructured":"National Institute of Standards and Technology. FIPS 198\u20131: The Keyed-Hash Message Authentication Code (HMAC). 2008. Available: https:\/\/csrc.nist.gov\/pubs\/fips\/198-1\/final [Accessed on 27 Aug 2023"},{"key":"2644_CR33","unstructured":"Berlekamp ER. Algebraic coding theory. World Science. 1968."},{"key":"2644_CR34","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s11948-017-9914-2","volume":"24","author":"SM Andoohgin","year":"2018","unstructured":"Andoohgin SM, Jazi MD, Borchardt G, et al. Detecting hijacked journals by using classification algorithms. Sci Eng Ethics. 2018;24:655\u201368. https:\/\/doi.org\/10.1007\/s11948-017-9914-2.","journal-title":"Sci Eng Ethics"},{"issue":"6","key":"2644_CR35","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3390\/fi13060154","volume":"13","author":"A Butnaru","year":"2021","unstructured":"Butnaru A, Mylonas A, Pitropakis N. Towards lightweight URL-based phishing detection. Future Internet. 2021;13(6):154. https:\/\/doi.org\/10.3390\/fi13060154.","journal-title":"Future Internet"},{"issue":"1","key":"2644_CR36","doi-asserted-by":"publisher","first-page":"97","DOI":"10.21608\/mjeer.2021.146286","volume":"30","author":"MA El-Rashidy","year":"2021","unstructured":"El-Rashidy MA. A smart model for web phishing detection based on new proposed feature selection technique. Menoufia J Electron Eng. 2021;30(1):97\u2013104. https:\/\/doi.org\/10.21608\/mjeer.2021.146286.","journal-title":"Menoufia J Electron Eng"},{"key":"2644_CR37","doi-asserted-by":"publisher","first-page":"2595794","DOI":"10.1155\/2019\/2595794","volume":"2019","author":"W Wang","year":"2019","unstructured":"Wang W, Zhang F, Luo X, Zhang S. PDRCNN: precise phishing detection with recurrent convolutional neural networks. Secur Commun Netw. 2019;2019:2595794. https:\/\/doi.org\/10.1155\/2019\/2595794.","journal-title":"Secur Commun Netw"},{"key":"2644_CR38","doi-asserted-by":"crossref","unstructured":"Al-Ahmadi S. A deep learning technique for web phishing detection combined URL features and visual similarity. Int J Comput Netw Commun (IJCNC) 12(5). 2020. Available at SSRN:\u00a0https:\/\/ssrn.com\/abstract=3716033.","DOI":"10.5121\/ijcnc.2020.12503"},{"issue":"15","key":"2644_CR39","doi-asserted-by":"publisher","first-page":"7441","DOI":"10.3390\/app12157441","volume":"12","author":"H Alqahtani","year":"2022","unstructured":"Alqahtani H, Alotaibi SS, Alrayes FS, Al-Turaiki I, Alissa KA, Aziz ASA, Maray M, Al DM. Evolutionary algorithm with deep auto encoder network based website phishing detection and classification. Appl Sci. 2022;12(15):7441. https:\/\/doi.org\/10.3390\/app12157441.","journal-title":"Appl Sci"},{"key":"2644_CR40","doi-asserted-by":"publisher","first-page":"106505","DOI":"10.1016\/j.asoc.2020.106505","volume":"95","author":"E Zhu","year":"2020","unstructured":"Zhu E, Ju Y, Chen Z, Liu F, Fang X. DTOF-ANN: an artificial neural network phishing detection model based on decision tree and optimal features. Appl Soft Comput. 2020;95:106505. https:\/\/doi.org\/10.1016\/j.asoc.2020.106505.","journal-title":"Appl Soft Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02644-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02644-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02644-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T15:17:11Z","timestamp":1710429431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02644-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["2644"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02644-4","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"23 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that we have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"324"}}