{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:06:02Z","timestamp":1774159562173,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599279","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Online phishing classification using adversarial data mining and signaling games"],"prefix":"10.1145","author":[{"given":"Gaston","family":"L'Huillier","sequence":"first","affiliation":[{"name":"University of Chile, Santiago, Chile"}]},{"given":"Richard","family":"Weber","sequence":"additional","affiliation":[{"name":"University of Chile, Santiago, Chile"}]},{"given":"Nicolas","family":"Figueroa","sequence":"additional","affiliation":[{"name":"University of Chile, Santiago, Chile"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299021"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_3_1","first-page":"373","volume-title":"Detection of Phishing Attacks: A Machine Learning Approach","author":"Basne R.","year":"2008","unstructured":"R. Basne , S. Mukkamala , and A. H. Sung . Detection of Phishing Attacks: A Machine Learning Approach , chapter Studies in Fuzziness and Soft Computing, pages 373 -- 383 . Springer Berlin \/ Heidelberg , 2008 . R. Basne, S. Mukkamala, and A. H. Sung. Detection of Phishing Attacks: A Machine Learning Approach, chapter Studies in Fuzziness and Soft Computing, pages 373--383. Springer Berlin \/ Heidelberg, 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"Journal of Computer Security","author":"Bergholz A.","year":"2009","unstructured":"A. Bergholz , J. D. Beer , S. Glahn , M.-F. Moens , G. Paass , and S. Strobel . New filtering approaches for phishing email . Journal of Computer Security , 2009 . Accepted for publication. A. Bergholz, J. D. Beer, S. Glahn, M.-F. Moens, G. Paass, and S. Strobel. New filtering approaches for phishing email. Journal of Computer Security, 2009. Accepted for publication."},{"key":"e_1_3_2_1_5_1","volume-title":"Fifth Conference on Email and Anti-Spam, CEAS 2008","author":"Bergholz A.","year":"2008","unstructured":"A. Bergholz , J.-H. Chang , G. Paass , F. Reichartz , and S. Strobel . Improved phishing detection using model-based features . In Fifth Conference on Email and Anti-Spam, CEAS 2008 , 2008 . A. Bergholz, J.-H. Chang, G. Paass, F. Reichartz, and S. Strobel. Improved phishing detection using model-based features. In Fifth Conference on Email and Anti-Spam, CEAS 2008, 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_54"},{"key":"e_1_3_2_1_7_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.-C.","year":"2001","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines , 2001 . Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm. C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001. Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_11_1","volume-title":"Game Theory","author":"Fudenbert D.","year":"1991","unstructured":"D. Fudenbert and J. Tirole . Game Theory . MIT Press , October 1991 . D. Fudenbert and J. Tirole. Game Theory. MIT Press, October 1991."},{"key":"e_1_3_2_1_12_1","first-page":"213","article-title":"A new approximate maximal margin classification algorithm","volume":"2","author":"Gentile C.","year":"2001","unstructured":"C. Gentile . A new approximate maximal margin classification algorithm . Journal of Machine Learning Research , 2 : 213 -- 242 , December 2001 . C. Gentile. A new approximate maximal margin classification algorithm. Journal of Machine Learning Research, 2:213--242, December 2001.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_13_1","volume-title":"Game Theory for Applied Economists","author":"Gibbons R.","year":"1992","unstructured":"R. Gibbons . Game Theory for Applied Economists . Princeton University Press , 1992 . R. Gibbons. Game Theory for Applied Economists. Princeton University Press, 1992."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0270"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789054.2789085"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/1912767"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_19_1","volume-title":"Gambit: Software tools for game theory, version 0.2007.01.30","author":"McKelvey R. D.","year":"2007","unstructured":"R. D. McKelvey , A. M. McLennan , and T. L. Turocy . Gambit: Software tools for game theory, version 0.2007.01.30 , 2007 . R. D. McKelvey, A. M. McLennan, and T. L. Turocy. Gambit: Software tools for game theory, version 0.2007.01.30, 2007."},{"key":"e_1_3_2_1_20_1","first-page":"6","volume-title":"Games and Economic Behavior","author":"McKelvey R. D.","year":"1996","unstructured":"R. D. McKelvey and T. R. Palfrey . Quantal response equilibria for normal form games. In Normal Form Games , Games and Economic Behavior , pages 6 -- 38 , 1996 . R. D. McKelvey and T. R. Palfrey. Quantal response equilibria for normal form games. In Normal Form Games, Games and Economic Behavior, pages 6--38, 1996."},{"key":"e_1_3_2_1_21_1","volume-title":"Phishing corpus","author":"Nazario J.","year":"2004","unstructured":"J. Nazario . Phishing corpus , 2004 --2007. J. Nazario. Phishing corpus, 2004--2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387716"},{"key":"e_1_3_2_1_23_1","volume-title":"Advances in Kernel Methods - Support Vector Learning","author":"Platt J.","year":"1998","unstructured":"J. Platt . Sequential minimal optimization: A fast algorithm for training support vector machines . In B. Schoelkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning . MIT Press , 1998 . J. Platt. Sequential minimal optimization: A fast algorithm for training support vector machines. In B. Schoelkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning. MIT Press, 1998."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277813"},{"key":"e_1_3_2_1_25_1","volume-title":"Learning game theoretic model parameters applied to adversarial classification. Master's thesis","author":"S\u00f6nmez O.","year":"2008","unstructured":"O. S\u00f6nmez . Learning game theoretic model parameters applied to adversarial classification. Master's thesis , Saarland University , 2008 . O. S\u00f6nmez. Learning game theoretic model parameters applied to adversarial classification. Master's thesis, Saarland University, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.2495\/978-1-85312-995-7\/04","volume-title":"Text Mining and its Applications to Intelligence, CRM and Knowledge Management","author":"Sebastiani F.","year":"2005","unstructured":"F. Sebastiani . Text categorization . In A. Zanasi, editor, Text Mining and its Applications to Intelligence, CRM and Knowledge Management , pages 109 -- 129 . WIT Press , Southampton, UK , 2005 . F. Sebastiani. Text categorization. In A. Zanasi, editor, Text Mining and its Applications to Intelligence, CRM and Knowledge Management, pages 109--129. WIT Press, Southampton, UK, 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2004.04.003"},{"key":"e_1_3_2_1_29_1","volume-title":"Economic Theory","volume":"42","author":"Turocy T. L.","year":"2010","unstructured":"T. L. Turocy . Using quantal reponse to compute nash and sequential equilibria . Economic Theory , Vol. 42 , Issue 1 , 2010 . T. L. Turocy. Using quantal reponse to compute nash and sequential equilibria. Economic Theory, Vol. 42, Issue 1, 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"V. N. Vapnik. The Nature of Statistical Learning Theory (Information Science and Statistics). Springer 1999.   V. N. Vapnik. The Nature of Statistical Learning Theory (Information Science and Statistics) . Springer 1999.","DOI":"10.1007\/978-1-4757-3264-1_8"},{"key":"e_1_3_2_1_31_1","volume-title":"Special Issues in Information Processing Technology for web utilization, vE87-D i2.:389--396","author":"Velasquez J.","year":"2004","unstructured":"J. Velasquez , H. Yasuda , T. Aoki , and R. Weber . A new similarity measure to understand visitor behavior in a web site. IEICE Transactions on Information and Systems , Special Issues in Information Processing Technology for web utilization, vE87-D i2.:389--396 , 2004 . J. Velasquez, H. Yasuda, T. Aoki, and R. Weber. A new similarity measure to understand visitor behavior in a web site. IEICE Transactions on Information and Systems, Special Issues in Information Processing Technology for web utilization, vE87-D i2.:389--396, 2004."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/17440080580000083"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956778"},{"key":"e_1_3_2_1_34_1","volume-title":"Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann","author":"Witten I. H.","year":"2005","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann , San Francisco , 2 nd edition edition, 2005 . I. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, San Francisco, 2nd edition edition, 2005.","edition":"2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014089"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401987"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Paris France","acronym":"KDD09","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":36,"alternative-id":["10.1145\/1599272.1599279","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599279","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}