{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:14:49Z","timestamp":1760170489380},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/ecrime.2008.4696967","type":"proceedings-article","created":{"date-parts":[[2008,12,9]],"date-time":"2008-12-09T21:55:28Z","timestamp":1228859728000},"source":"Crossref","is-referenced-by-count":26,"title":["Evolutionary study of phishing"],"prefix":"10.1109","author":[{"given":"Danesh","family":"Irani","sequence":"first","affiliation":[]},{"given":"Steve","family":"Webb","sequence":"additional","affiliation":[]},{"given":"Jonathon","family":"Giffin","sequence":"additional","affiliation":[]},{"given":"Calton","family":"Pu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"22","article-title":"phishing special report: what to expect for 2007","year":"2007"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775246"},{"key":"23","year":"0","journal-title":"Evolution of phishing attacks"},{"key":"18","article-title":"fingerprinting by random polynomials","author":"rabin","year":"1981"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/LAWEB.2003.1250280","article-title":"on the evolution of clusters of near-duplicate web","author":"fetterly","year":"2003","journal-title":"Proceedings of the 1st Latin American Web Congress"},{"key":"16","year":"2005","journal-title":"Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval"},{"key":"13","article-title":"characterizing web spam using content and http session analysis","author":"webb","year":"2007","journal-title":"Proceedings of the 4th Conference on Email and Anti-Spam"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00031-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"12","article-title":"junkemailfilter.com - how it works","year":"0"},{"key":"21","year":"0"},{"key":"3","author":"ward","year":"0","journal-title":"Criminals exploit net phone calls"},{"key":"20","year":"0"},{"key":"2","year":"0","journal-title":"Phishing Earliest citation"},{"key":"1","author":"mccal","year":"2007","journal-title":"Gartner survey shows phishing attacks escalated in 2007"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"7","article-title":"observed trends in spam construction techniques: a case study of spam evolution","author":"pu","year":"2006","journal-title":"Proceedings of the 3rd Conference on Email and Anti-Spam"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"5","year":"2008"},{"key":"4","year":"2005"},{"key":"9","article-title":"a multifaceted approach to spam reduc-tion","author":"leiba","year":"2004","journal-title":"Proceedings of the 1st Conference on Email and Anti-Spam"},{"key":"8","author":"cormack","year":"0","journal-title":"A study of supervised spam detection applied to eight months of personal"}],"event":{"name":"2008 eCrime Researchers Summit (eCrime 2008)","location":"Atlanta, GA, USA","start":{"date-parts":[[2008,10,15]]},"end":{"date-parts":[[2008,10,16]]}},"container-title":["2008 eCrime Researchers Summit"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4689052\/4696962\/04696967.pdf?arnumber=4696967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T14:34:18Z","timestamp":1497796458000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4696967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ecrime.2008.4696967","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}