{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:57:05Z","timestamp":1725728225624},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/ecrime.2009.5342620","type":"proceedings-article","created":{"date-parts":[[2009,12,8]],"date-time":"2009-12-08T19:42:45Z","timestamp":1260301365000},"page":"1-12","source":"Crossref","is-referenced-by-count":7,"title":["Humboldt: A distributed phishing disruption system"],"prefix":"10.1109","author":[{"given":"Paul","family":"Knickerbocker","sequence":"first","affiliation":[]},{"family":"Dongting Yu","sequence":"additional","affiliation":[]},{"family":"Jun Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","article-title":"fighting phishing attacks: a lightweight trust architecture for detecting spoofed emails","author":"adida","year":"2005","journal-title":"Proceedings of DIMACS Workshop on Theft in ECommerce Content Identity and Service"},{"key":"14","article-title":"yahoo!'s sign-in seal and current anti-phishing solutions","author":"agarwal","year":"2007","journal-title":"Proceedings of Web 2 0 Security & Privacy Workshop"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"key":"3","article-title":"an empirical analysis of the current state of phishing attack and defence","author":"moore","year":"2007","journal-title":"Workshop on the Economics of Information Security 2007"},{"year":"0","key":"20"},{"journal-title":"PhishTank","year":"0","author":"opendns","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.32"},{"year":"0","key":"10"},{"key":"7","article-title":"client-side defense against web-based identity theft","author":"chou","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143126"},{"year":"0","key":"5"},{"key":"4","first-page":"2","article-title":"stronger password authentication using browser extensions","author":"ross","year":"2005","journal-title":"SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2009 eCrime Researchers Summit (eCRIME)","start":{"date-parts":[[2009,9,20]]},"location":"Tacoma, WA, USA","end":{"date-parts":[[2009,10,21]]}},"container-title":["2009 eCrime Researchers Summit"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5339470\/5342603\/05342620.pdf?arnumber=5342620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T19:11:37Z","timestamp":1489864297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5342620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ecrime.2009.5342620","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}