{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:34:28Z","timestamp":1775262868984,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013124","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:34:53Z","timestamp":1421850893000},"page":"214-219","source":"Crossref","is-referenced-by-count":11,"title":["Survey of anti-phishing tools with detection capabilities"],"prefix":"10.1109","author":[{"given":"Hiba Zuhair","family":"Zeydan","sequence":"first","affiliation":[]},{"given":"Ali","family":"Selamat","sequence":"additional","affiliation":[]},{"given":"Mazleena","family":"Salleh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.02.001"},{"key":"35","article-title":"BogusBiter: A transparent protection against phishing attacks","volume":"10","author":"yue","year":"2010","journal-title":"Acm Trans Internet Technology College William Mary"},{"key":"17","first-page":"163","article-title":"Phishing Secrets: History, Effects, Countermeasures","volume":"11","author":"san martino","year":"2010","journal-title":"IJ Network Security"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211286548"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"15","author":"wardman","year":"2011","journal-title":"A Series of Methods for the Systematic Reduction of Phishing"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/SAR-SSI.2011.5931389"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.09.003"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/CCCA.2011.6031523"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.12"},{"key":"14","author":"al-khateeb","year":"2011","journal-title":"Security and Usability in Click-based Authentication Systems"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2008.4753929"},{"key":"11","article-title":"A phishing analysis of web based systems","author":"pravin","year":"2011","journal-title":"2011 Int Conf Comput & Security Proc Communication acm"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.11.003"},{"key":"21","article-title":"An empirical analysis of phishing blacklists","author":"sheng","year":"2009","journal-title":"Sixth Conference on Email and Anti-spam"},{"key":"20","doi-asserted-by":"crossref","first-page":"15","DOI":"10.47893\/IJCNS.2011.1014","article-title":"Detection of phishing websites and secure transactions","volume":"1","author":"dhanalakshmi","year":"2011","journal-title":"(IJCNS) International Journal of Computer and Network Security"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.004"},{"key":"41","article-title":"Rule-based phishing attack detection","author":"basnet","year":"2011","journal-title":"Int Conf Security Management (sam 2011)"},{"key":"40","article-title":"Rating the Authenticity of Websites","author":"witte","year":"2012","journal-title":"18th Twente Student Conference on IT"},{"key":"22","author":"gowtham","year":"2014","journal-title":"An Efficacious Method for Detecting Phishing Webpage Through Target Domain Identification"},{"key":"23","article-title":"Phishing websites detection based on phishing characteristics in the webpage source code","author":"alkhozae","year":"2011","journal-title":"International Journal of Information and Communication Technology Research"},{"key":"24","article-title":"Interactive website filter for safe web browsing","volume":"1","author":"jo","year":"2013","journal-title":"J Inform Sci Eng"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.175"},{"key":"26","article-title":"Prevention approach of phishing on different websites","volume":"2","author":"bhati","year":"2012","journal-title":"Int J Eng Technol"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654816"},{"key":"28","author":"chaudhary","year":"2012","journal-title":"Recognition of Phishing Attacks Utilizing Anomalies in Phishing Websites"},{"key":"29","first-page":"458","article-title":"Phishing & anti-phishing techniques: Case study","volume":"3","author":"chhikara","year":"2013","journal-title":"International Journal of Advance Research in Computer Science and Software Engineering"},{"key":"3","article-title":"Design & development of a plug-in for a browser against phishing attacks","volume":"2","author":"upadhyaya","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.046"},{"key":"10","article-title":"Efficacy of Anti-phishing Measures and Strategies-A research Analysis","volume":"70","author":"bindra","year":"2010","journal-title":"Proc Of World Academy of Science Engineering and Technology"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.020"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.335"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2013.04.078"},{"key":"31","author":"whittaker","year":"2010","journal-title":"Large-scale Automatic Classification of Phishing Pages"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717870"},{"key":"9","author":"anti-phishing working group","year":"0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.103"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2014,8,26]]},"end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013124.pdf?arnumber=7013124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:47:50Z","timestamp":1651020470000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013124","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}