{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:49:11Z","timestamp":1725706151391},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856731","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"365-370","source":"Crossref","is-referenced-by-count":3,"title":["Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features"],"prefix":"10.1109","author":[{"given":"Gaurav","family":"Varshney","sequence":"first","affiliation":[]},{"given":"Manoj","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Pradeep K.","family":"Atrey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.875221"},{"key":"ref11","article-title":"A survey and classification of web phishing detection schemes","author":"varshney","year":"0","journal-title":"Security and Communication Networks pp n\/a &#x2014; n\/a 2016 sCN-15-0554 Rl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.08.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27901-0_15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717870"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526786"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2010.24"},{"journal-title":"Google","article-title":"How google search works@ON-LINE","year":"2016","key":"ref18"},{"journal-title":"APWG","article-title":"Apwg phishing attack trends reports@ONLINE","year":"2015","key":"ref19"},{"key":"ref4","first-page":"298","article-title":"A novel approach for phishing detection using url-based heuristic","author":"nguyen","year":"2014","journal-title":"Computing Management and Telecommunications (ComManTel) 2014 InternationalConference on"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.01.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435366"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0202"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.02.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.66"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345494"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.044"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"journal-title":"Jamey","article-title":"Download alexa top 1, 000,000websites for free@ONLINE","year":"2015","key":"ref22"},{"journal-title":"Alexa","article-title":"The top 500 sites on web","year":"2016","key":"ref21"},{"journal-title":"PhishTank","article-title":"Developer information@ONLINE","year":"2015","key":"ref24"},{"journal-title":"Google","article-title":"Safe browsing api@ONLINE","year":"2014","key":"ref23"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856731.pdf?arnumber=7856731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T19:53:27Z","timestamp":1513194807000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856731","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}