{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T20:57:29Z","timestamp":1761339449877},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/ispacs.2014.7024424","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T12:16:33Z","timestamp":1423138593000},"page":"054-059","source":"Crossref","is-referenced-by-count":17,"title":["Phishing website detection using URL-assisted brand name weighting system"],"prefix":"10.1109","author":[{"given":"Choon Lin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Kang Leng","family":"Chiew","sequence":"additional","affiliation":[]},{"given":"San Nah","family":"Sze","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/TDSC.2006.50"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/IEEEGCC.2011.5752505"},{"key":"18","article-title":"Phishdef: Url names say it all","author":"le","year":"2010","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.dss.2014.01.002"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ICCSNT.2012.6526142"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ICCCN.2010.5560168"},{"key":"14","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/ACSAC.2006.13","article-title":"Anomaly based web phishing page detection","author":"pan","year":"2006","journal-title":"Computer Security Applications Conference 2006 ACSAC '06 22nd Annual"},{"year":"2014","author":"mclaughlin","journal-title":"What is A Brand Anyway?","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1242572.1242659"},{"year":"2011","author":"wang","journal-title":"Verilogo Proactive Phishing Detection Via Logo Recognition","key":"21"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/TNN.2011.2161999"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/ICIMP.2010.24"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/978-3-642-27901-0_15"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1007\/978-3-319-03756-1_50"},{"year":"0","key":"25"},{"key":"26","article-title":"Creating general-purpose corpora using automated search engine queries","author":"sharoff","year":"2006","journal-title":"Wacky! Working Papers on the Web As Corpus"},{"key":"27","article-title":"Approximating document frequency with term count values","author":"klein","year":"2008","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1145\/1124772.1124861"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TENCON.2010.5686582"},{"year":"0","key":"1"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICSC.2011.52"},{"year":"0","key":"8"}],"event":{"name":"2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","start":{"date-parts":[[2014,12,1]]},"location":"Kuching, Sarawak, Malaysia","end":{"date-parts":[[2014,12,4]]}},"container-title":["2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7006982\/7024408\/07024424.pdf?arnumber=7024424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:01:04Z","timestamp":1498179664000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7024424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ispacs.2014.7024424","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}