{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:16:14Z","timestamp":1770279374979,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336572","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["A new approach for the detection and analysis of phishing in social networks: the case of Twitter"],"prefix":"10.1109","author":[{"given":"Kamel Ahsene","family":"Djaballah","sequence":"first","affiliation":[{"name":"University Science and Technology Houari Boumediene,Algiers,Algeria"}]},{"given":"Kamel","family":"Boukhalfa","sequence":"additional","affiliation":[{"name":"University Science and Technology Houari Boumediene,Algiers,Algeria"}]},{"given":"Zakaria","family":"Ghalem","sequence":"additional","affiliation":[{"name":"University Science and Technology Houari Boumediene,Algiers,Algeria"}]},{"given":"Oussama","family":"Boukerma","sequence":"additional","affiliation":[{"name":"University Science and Technology Houari Boumediene,Algiers,Algeria"}]}],"member":"263","reference":[{"key":"ref10","first-page":"151","article-title":"A Distributed System for Detecting Phishing in Twitter Stream","volume":"3","author":"nair","year":"2014","journal-title":"International Journal of Engineering and Innovative Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"ref12","first-page":"141","article-title":"Phishing detection on Twitter streams","author":"jeong","year":"2016","journal-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining"},{"key":"ref13","author":"paolo","year":"2018","journal-title":"Tweets and the Streets Social Media and Contemporary Activism"},{"key":"ref14","article-title":"Improvement of classification features to increase phishing tweets detection accuracy","volume":"96","author":"liew","year":"2018","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2018.00056"},{"key":"ref16","first-page":"69","article-title":"Kn0w Thy Domaln Name&#x201D; Unbiased Phishing Detection Using Domain Name Based Features","author":"shirazi","year":"0","journal-title":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.004"},{"key":"ref18","year":"0"},{"key":"ref19","year":"0"},{"key":"ref4","first-page":"92","article-title":"Phi. sh\/$ ocial: the phishing landscape through short urls","author":"chhabra","year":"0","journal-title":"Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2010.108"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2012.6510259"},{"key":"ref5","first-page":"1","article-title":"Rule-based phishing attack detection","author":"basnet","year":"0","journal-title":"Proceedings of the International Conference on Security and Management (SAM)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2012.6489515"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2014.4727"},{"key":"ref20","year":"0"},{"key":"ref21","year":"0"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Paris, France","start":{"date-parts":[[2020,12,14]]},"end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336572.pdf?arnumber=9336572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:20Z","timestamp":1656602300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336572","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}