{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:27:04Z","timestamp":1725809224861},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/icacci.2014.6968578","type":"proceedings-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T22:33:17Z","timestamp":1417559597000},"page":"2285-2290","source":"Crossref","is-referenced-by-count":6,"title":["Approximate string matching algorithm for phishing detection"],"prefix":"10.1109","author":[{"given":"Dona","family":"Abraham","sequence":"first","affiliation":[]},{"given":"Nisha S","family":"Raj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2012.6409092"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005822"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402980"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654816"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6282648"},{"key":"ref16","article-title":"Phishing Detection using URL Prediction","author":"dona","year":"2014","journal-title":"Proc 4th IEEE International Conference on Advances in Engineering and Technology (ICAET)"},{"key":"ref17","article-title":"Technical Trends in Phishing Attacks","author":"milletary","year":"2005","journal-title":"Proc of Uninted States Computer Emergency Readiness Team (US-CERT)"},{"key":"ref18","article-title":"Anti phishing through Phishing Target Discovery","author":"wenyin","year":"2012","journal-title":"Proceedings of IEEE Computer Society"},{"key":"ref19","article-title":"Large-Scale Automatic Classification of Phishing Pages","author":"whittaker","year":"2010","journal-title":"Proc NDSS The Internet Society"},{"journal-title":"Anti-Phishing Work Group Report","article-title":"Phishing Activity Trends Report","year":"2013","key":"ref4"},{"journal-title":"Anatomy of a URL","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.306"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref8","first-page":"1","article-title":"Decisive heuristics to differentiate legitimate from phishing sites","author":"sophie","year":"2011","journal-title":"Proc of Network and Information Systems Security Conference"},{"key":"ref7","first-page":"422","article-title":"Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages","author":"khonji","year":"2011","journal-title":"Proc International Conference for Internet Technology and Secured Transactions (lCITST)"},{"journal-title":"The open-content directory of World Wide Web links &#x201C;DMOZ&#x201D;","year":"0","key":"ref2"},{"journal-title":"Anti-Phishing site &#x201C;PhishTank&#x201D;","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.66"}],"event":{"name":"2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2014,9,24]]},"location":"Delhi, India","end":{"date-parts":[[2014,9,27]]}},"container-title":["2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6949764\/6968191\/06968578.pdf?arnumber=6968578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:40:15Z","timestamp":1602686415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6968578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icacci.2014.6968578","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}