{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:23Z","timestamp":1748583923720},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/vizsec48167.2019.9161590","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T22:10:52Z","timestamp":1596838252000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks"],"prefix":"10.1109","author":[{"given":"Brett","family":"Fouss","sequence":"first","affiliation":[]},{"given":"Dennis M.","family":"Ross","sequence":"additional","affiliation":[]},{"given":"Allan B.","family":"Wollaber","sequence":"additional","affiliation":[]},{"given":"Steven R.","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1257\/089533005775196732"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/503124.503156"},{"year":"0","key":"ref12"},{"key":"ref13","article-title":"Nameprep: A Stringprep Profile for Inter-nationalized Domain Names (IDN)","author":"hoffman","year":"2003","journal-title":"RFC 3491"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501473"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00072"},{"journal-title":"Idn display algorithm","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2467591"},{"journal-title":"The Unicode standard A technical introduction","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/science.1160379"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3492"},{"journal-title":"The Zeek Network Security Monitor","year":"0","key":"ref3"},{"key":"ref6","article-title":"UTR 36: Unicode security considerations","author":"davis","year":"2014","journal-title":"Technical Report"},{"key":"ref5","article-title":"Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework","author":"costello","year":"2010","journal-title":"RFC 5890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3490"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"journal-title":"Alexa Top Sites","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5893"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1086\/667782"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78849-2_29"},{"article-title":"Phishing with unicode domains","year":"0","author":"zheng","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243754"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208291"}],"event":{"name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","start":{"date-parts":[[2019,10,23]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9154509\/9161385\/09161590.pdf?arnumber=9161590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:50:20Z","timestamp":1658155820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9161590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/vizsec48167.2019.9161590","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}