{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:21:11Z","timestamp":1752672071640,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336559","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T18:20:56Z","timestamp":1612376456000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Survey paper: Taxonomy of website anti-phishing solutions"],"prefix":"10.1109","author":[{"given":"Rania","family":"Zaimi","sequence":"first","affiliation":[{"name":"LRS Laboratory University of Badji Mokhtar,Department of Computer Science,Annaba,Algeria,23000"}]},{"given":"Mohamed","family":"Hafidi","sequence":"additional","affiliation":[{"name":"LRS Laboratory University of Badji Mokhtar,Department of Computer Science,Annaba,Algeria,23000"}]},{"given":"Mahnane","family":"Lamia","sequence":"additional","affiliation":[{"name":"LRS Laboratory University of Badji Mokhtar,Department of Computer Science,Annaba,Algeria,23000"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355342"},{"key":"ref11","first-page":"2349","article-title":"USING black-list and white-list technique to detect malicious URLs","volume":"4","author":"tariq","year":"2017","journal-title":"International Journal of Innovative Research in Information Security (IJIRIS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2018.8474040"},{"key":"ref13","article-title":"Classification of anti phishing solutions","author":"s","year":"2019","journal-title":"SN Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2010.24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.28"},{"key":"ref16","first-page":"639648","article-title":"CANTINA: a content-based approach to detecting phishing web sites","author":"y","year":"2007","journal-title":"16th international conference on World Wide Web"},{"key":"ref17","first-page":"1626","article-title":"Utilisation of website logo for phishing detection","volume":"54","author":"kl","year":"2015","journal-title":"Comput Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EPSCICON.2012.6175228"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INF-COM.2010.5462216"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16660-1_12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2017.8463818"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"ref5","first-page":"2456","article-title":"Phishing website detection using machine learning: A Review","volume":"3","author":"pujara","year":"2018","journal-title":"International Journal of Scientific Research in Computer Science Engineering and Information Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01637-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1674"},{"journal-title":"La protection de la vie prive sur Internet","year":"2018","author":"belabed","key":"ref2"},{"journal-title":"Phishing Activity Trends Report 1 Quarter Most","first-page":"112","year":"2020","key":"ref1"},{"journal-title":"Learning a Deep Neural network for predicting phishing website","year":"2019","author":"robat","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7913","DOI":"10.1016\/j.eswa.2010.04.044","article-title":"Intelligent phishing detection system for e-banking using fuzzy data mining","volume":"37","author":"m","year":"2010","journal-title":"Journal of Expert System with Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2584680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.50"},{"key":"ref23","first-page":"2g","article-title":"A Survey of URL-based phishing detection","author":"aung","year":"2019","journal-title":"DEIM-Forum"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336559.pdf?arnumber=9336559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T11:18:20Z","timestamp":1656587900000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336559","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}