{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:59:53Z","timestamp":1730293193670,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,11]]},"DOI":"10.1109\/roedunet51892.2020.9324850","type":"proceedings-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T18:53:17Z","timestamp":1611341597000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Computer Vision Based Framework For Detecting Phishing Webpages"],"prefix":"10.1109","author":[{"given":"Ionut","family":"Cernica","sequence":"first","affiliation":[]},{"given":"Nirvana","family":"Popescu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1093\/comjnl\/bxh169"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/INCoS.2013.151"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref13","first-page":"16","volume":"54","author":"chiew","year":"2015","journal-title":"Utilisation of website logo for phishing detection Computers & Security"},{"key":"ref14","first-page":"12","volume":"61","author":"ramesh","year":"2014","journal-title":"An efficacious method for detecting phishing webpages through target domain identification Decision Support Systems"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2019599.2019606"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/eCRS.2013.6805775"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2212776.2223683"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CSCS.2019.00056"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.eswa.2011.01.046"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/IMSAA.2008.4753929"},{"key":"ref3","first-page":"1060","article-title":"Detection of Phishing Web Pages Based on Visual Similarity","author":"liu","year":"0","journal-title":"Proc 14th Int'l World Wide Web Conf"},{"key":"ref6","first-page":"18","volume":"88","author":"tan","year":"2016","journal-title":"Phishwho Phishing webpage detection via identity keywords extraction and target domain name finder Decision Support Systems"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1290958.1290968"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFCOM.2010.5462216"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1124772.1124861"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1299015.1299016"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2063176.2063197"},{"key":"ref9","article-title":"A layout-similarity based approach for detecting phishingPages","author":"rosiello","year":"0","journal-title":"IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)"}],"event":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","start":{"date-parts":[[2020,12,11]]},"location":"Bucharest, Romania","end":{"date-parts":[[2020,12,12]]}},"container-title":["2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9324360\/9324844\/09324850.pdf?arnumber=9324850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:51:20Z","timestamp":1656438680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9324850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/roedunet51892.2020.9324850","relation":{},"subject":[],"published":{"date-parts":[[2020,12,11]]}}}