{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:21:50Z","timestamp":1768281710282,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"},{"name":"Researchers Supporting Project","award":["PNURSP2025R235"],"award-info":[{"award-number":["PNURSP2025R235"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3642468","type":"journal-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T18:33:44Z","timestamp":1765391624000},"page":"1865-1876","source":"Crossref","is-referenced-by-count":0,"title":["A Web Protection Model Against Internationalized Domain Name Homograph Exploits"],"prefix":"10.1109","volume":"14","author":[{"given":"Sana","family":"Munir","sequence":"first","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3636-8053","authenticated-orcid":false,"given":"Akmal","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2495-6583","authenticated-orcid":false,"given":"Farkhanda","family":"Athar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9047-9734","authenticated-orcid":false,"given":"Mohammad Mansoor","family":"Qadir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, CECOS University of Information Technology and Emerging Sciences, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6688-0106","authenticated-orcid":false,"given":"Khalid J.","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Department of Clinical Laboratories Sciences, College of Applied Medical Sciences, Taif University, Taif, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3984-2718","authenticated-orcid":false,"given":"Akbayan","family":"Bekarystankyzy","sequence":"additional","affiliation":[{"name":"School of Digital Technologies, Narxoz University, Almaty, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4775-1798","authenticated-orcid":false,"given":"Amal","family":"Al-Rasheed","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Internationalization of Domain Names","author":"D\u00fcrst","year":"1998"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3490"},{"key":"ref3","volume-title":"IDN World Report, \u2013IDN Totals By Year","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/503124.503156"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2018.00072"},{"key":"ref6","volume-title":"Phishing With Unicode Domains","author":"Zheng","year":"2017"},{"key":"ref7","volume-title":"Elevating Network Security With DNS\u20132021 Global DNS Threat Report","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019icp0002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355587"},{"key":"ref11","first-page":"3739","article-title":"Assessing browser-level defense against IDN-based phishing","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Hu"},{"key":"ref12","first-page":"191","article-title":"The long \u2018taile\u2019 of typosquatting domain names","volume-title":"Proc. 23rd USENIX Secur. Symp. (USENIX Security)","author":"Szurdi"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.84"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70169-1_26"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098851"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131390"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09539-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423660"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80825-9_4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278569"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5892"},{"key":"ref25","volume-title":"GNU Unifont Glyphs","year":"2025"},{"key":"ref26","volume-title":"Majestic Million","year":"2025"},{"key":"ref27","volume-title":"Verisign: Top-Level Domain Zone File Information","year":"2025"},{"key":"ref28","volume-title":"DN Pedia\u2013Daily Domains in Zone","year":"2025"},{"key":"ref29","volume-title":"Langid.py","year":"2025"},{"key":"ref30","article-title":"Addressing the challenges of modern DNS: A comprehensive tutorial","volume":"45","author":"Olivier","year":"2025","journal-title":"Comput. Sci. Rev."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3517026"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100469"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/app13074419"},{"key":"ref34","first-page":"2922","article-title":"Hiding in plain sight: Tweets with hate speech masked by homoglyphs","volume-title":"Proc. Findings Assoc. Comput. Linguistics (EMNLP)","author":"Cooper"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3386905"},{"key":"ref36","volume-title":"Malicious homoglyph domain name detection and associated cyber security applications","author":"Mutolo","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103668"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11296804.pdf?arnumber=11296804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:41Z","timestamp":1768255361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11296804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3642468","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}