{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:28Z","timestamp":1759091188866,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T00:00:00Z","timestamp":1191456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,4]]},"DOI":"10.1145\/1299015.1299017","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"14-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Fishing for phishes"],"prefix":"10.1145","author":[{"given":"Rhiannon","family":"Weaver","sequence":"first","affiliation":[{"name":"CERT Network Situational Awareness Group, Pittsburgh, PA"}]},{"given":"M. Patrick","family":"Collins","sequence":"additional","affiliation":[{"name":"CERT Network Situational Awareness Group, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,4]]},"reference":[{"volume-title":"Proceedings of the first annual workshop on hot topics in botnets","year":"2007","author":"Abu Rajab M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.852741"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1979.10481038"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298319"},{"volume-title":"Proceedings of the First Workshop on Steps to reducing unwanted traffic on the internet (SRUTI)","year":"2005","author":"Cooke E.","key":"e_1_3_2_1_5_1"},{"volume-title":"Proceedings of the 13th Network and Distributed Security Symposium (NDSS)","year":"2006","author":"Dagon D.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1993.10476387"},{"volume-title":"MIT Press","year":"1980","author":"Fienberg S.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_19"},{"volume-title":"Duxbury Press","year":"1999","author":"Lohr S.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3242-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"volume-title":"Proceedings of the 2007 Workshop on the Economics of Information Security (WEIS)","year":"2007","author":"Moore T.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"volume-title":"Proceedings of the 2006 USENIX workshop on steps for reducing unwanted traffic on the internet (SRUTI)","year":"2006","author":"Ramachandran A.","key":"e_1_3_2_1_16_1"},{"volume-title":"New York Inc.","year":"1998","author":"Rawlings J.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"R. Thomas and J. Martin. The underground economy: Priceless. Usenix; login; 31(6) December 2006.  R. Thomas and J. Martin. The underground economy: Priceless. Usenix; login; 31(6) December 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1974.10480133"}],"event":{"name":"eCrime '07: eCrime '07 - Anti-phishing working group 2007 eCrime Researchers' Summit","acronym":"eCrime '07","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1299015.1299017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1299015.1299017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:15Z","timestamp":1750278135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1299015.1299017"}},"subtitle":["applying capture-recapture methods to estimate phishing populations"],"short-title":[],"issued":{"date-parts":[[2007,10,4]]},"references-count":18,"alternative-id":["10.1145\/1299015.1299017","10.1145\/1299015"],"URL":"https:\/\/doi.org\/10.1145\/1299015.1299017","relation":{},"subject":[],"published":{"date-parts":[[2007,10,4]]},"assertion":[{"value":"2007-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}