{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:00:49Z","timestamp":1760608849359},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/cnsm.2014.7014140","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:34:25Z","timestamp":1421868865000},"page":"46-54","source":"Crossref","is-referenced-by-count":22,"title":["PhishScore: Hacking phishers' minds"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Marchal","sequence":"first","affiliation":[]},{"given":"Jerome","family":"Francois","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/INFCOM.2010.5462216"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1038\/nature07634"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1553374.1553462"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1145\/2382438.2382440"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/INFCOM.2011.5934995"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1186\/1687-417X-2012-1"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1037\/\/0033-295X.104.2.211"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1145\/1234741.1234765"},{"key":"16","first-page":"422","article-title":"Lexical url analysis for discriminating phishing and legitimate e-mail messages","author":"khonji","year":"2011","journal-title":"2011 International Conference for Internet Technology and Secured Transactions (ICITST)"},{"year":"2009","author":"segaran","journal-title":"Beautiful Data The Stories behind Elegant Data Solutions","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/978-3-642-33338-5_10","article-title":"Proactive discovery of phishing related domain names","author":"marchal","year":"2012","journal-title":"Research in Attacks Intrusions and Defenses"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/52324.52338"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1314389.1314391"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/1656274.1656278"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/1882471.1882479"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1023\/A:1010933404324"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1145\/1879141.1879148"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/1754393.1754394"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/1460877.1460905"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1145\/1526709.1526786"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1145\/1242572.1242659"},{"key":"28","article-title":"Building a dynamic reputation system for DNS","author":"antonakakis","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"29","article-title":"Exposure: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proceedings of NDSS"},{"year":"2012","journal-title":"Global Phishing Survey Trends and Domain Name Use","key":"3"},{"year":"2010","journal-title":"2010 Identity Fraud Survey Report","key":"2"},{"year":"1987","author":"mockapetris","journal-title":"RFC 1035 Domain names - implementation and specification","key":"10"},{"year":"2007","journal-title":"Gartner survey shows phishing attacks escalated in 2007","key":"1"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1145\/1557019.1557153"},{"key":"7","article-title":"Disco: A multilingual database of distributionally similar words","author":"kolb","year":"2008","journal-title":"Proceedings of KONVENS-2008"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TKDE.2007.48"},{"key":"32","first-page":"1521","article-title":"Parsing and detecting phishing pages based on semantic understanding of text","author":"zhang","year":"2012","journal-title":"Journal of Information &Computational Science"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.3115\/981623.981633"},{"key":"31","article-title":"Highly predictive blacklisting","author":"zhang","year":"2008","journal-title":"Proceedings of the 17th Conference on Security Symposium USENIX Association"},{"year":"2013","journal-title":"Phishing Activity Trends Report","key":"4"},{"year":"1987","author":"mockapetris","journal-title":"Rfc 1034 Domain Names-concepts and Facilities","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/219717.219748"}],"event":{"name":"2014 10th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2014,11,17]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2014,11,21]]}},"container-title":["10th International Conference on Network and Service Management (CNSM) and Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000620\/7014126\/07014140.pdf?arnumber=7014140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:19Z","timestamp":1498190599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7014140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2014.7014140","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}