{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:08:48Z","timestamp":1767182928705,"version":"3.41.0"},"reference-count":110,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:p>The phishing scam and its variants are estimated to cost victims billions of dollars per year. Researchers have responded with a number of anti-phishing systems, based either on blacklists or on heuristics. The former cannot cope with the churn of phishing sites, while the latter usually employ decision rules that are not congruent to human perception. We propose a novel heuristic anti-phishing system that explicitly employs gestalt and decision theory concepts to model perceptual similarity. Our system is evaluated on three corpora contrasting legitimate Web sites with real-world phishing scams. The proposed system\u2019s performance was equal or superior to current best-of-breed systems. We further analyze current anti-phishing warnings from the perspective of warning theory, and propose a new warning design employing our Gestalt approach.<\/jats:p>","DOI":"10.1145\/2584680","type":"journal-article","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T12:48:53Z","timestamp":1399466933000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["An Anti-Phishing System Employing Diffused Information"],"prefix":"10.1145","volume":"16","author":[{"given":"Teh-Chung","family":"Chen","sequence":"first","affiliation":[{"name":"University of Alberta"}]},{"given":"Torin","family":"Stepan","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"Scott","family":"Dick","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"James","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Alberta"}]}],"member":"320","published-online":{"date-parts":[[2014,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Aaron G. and Manning R. 2012. Phishing activity trends report 2nd half 2011. Anti-Phishing Working Group San Francisco CA.  Aaron G. and Manning R. 2012. Phishing activity trends report 2nd half 2011. Anti-Phishing Working Group San Francisco CA."},{"volume-title":"Proceedings of IEEE Forum on Research and Technology Advances in Digital Libraries.","author":"Andresen D.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"ANSI 2007a. ANSI Z535.1-2006: American national standard for safety colors. National Electrical Manufacturers Association Rosslyn VA.  ANSI 2007a. ANSI Z535.1-2006: American national standard for safety colors. National Electrical Manufacturers Association Rosslyn VA."},{"key":"e_1_2_1_4_1","unstructured":"ANSI 2007b. ANSI Z535.2-2007: American national standard for environmental and facility safety signs. National Electrical Manufacturers Association Rosslyn VA.  ANSI 2007b. ANSI Z535.2-2007: American national standard for environmental and facility safety signs. National Electrical Manufacturers Association Rosslyn VA."},{"key":"e_1_2_1_5_1","unstructured":"ANSI 2007c. ANSI Z535.3-2007: American national standard criteria for safety symbols. National Electrical Manufacturers Association Rosslyn VA.  ANSI 2007c. ANSI Z535.3-2007: American national standard criteria for safety symbols. National Electrical Manufacturers Association Rosslyn VA."},{"key":"e_1_2_1_6_1","unstructured":"ANSI 2007d. ANSI Z535.4-2007: American national standard for product safety signs and labels. National Electrical Manufacturers Association Rosslyn VA.  ANSI 2007d. ANSI Z535.4-2007: American national standard for product safety signs and labels. National Electrical Manufacturers Association Rosslyn VA."},{"volume-title":"Proceedings of the IEEE International Symposium on Information Theory.","author":"Bardera A.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.02.009"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31087-4_27"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2009.08136"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0603-76"},{"key":"e_1_2_1_12_1","unstructured":"Bliss J. P. and Fallon C. K. 2006. Active warnings: False alarms. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 231--242.  Bliss J. P. and Fallon C. K. 2006. Active warnings: False alarms. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 231--242."},{"key":"e_1_2_1_13_1","unstructured":"Burrows M. and Wheeler D. J. 1994. A block-sorting lossless data compression algorithm. HP Labs System Research Center Palo Alto CA.  Burrows M. and Wheeler D. J. 1994. A block-sorting lossless data compression algorithm. HP Labs System Research Center Palo Alto CA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766091.1766143"},{"key":"e_1_2_1_15_1","unstructured":"Cameron K. A. and Dejoy D. M. 2006. The persuasive functions of warnings: Theory and models. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 301--312.  Cameron K. A. and Dejoy D. M. 2006. The persuasive functions of warnings: Theory and models. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 301--312."},{"volume-title":"Proceedings of the International Conference on Image Processing. 14--17","author":"Carnec M.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4310\/CIS.2005.v5.n4.a1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Chaitin G. J. 1987. Algorithmic Information Theory. Cambridge University Press Cambridge UK.   Chaitin G. J. 1987. Algorithmic Information Theory . Cambridge University Press Cambridge UK.","DOI":"10.1017\/CBO9780511608858"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754394"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2010.2096469"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Chou N.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844059"},{"key":"e_1_2_1_25_1","unstructured":"Cohen J. 1988. Statistical Power Analysis for the Behavioral Sciences 2nd Ed. Lawrence Earlbaum Associates Hillsdale NJ.  Cohen J. 1988. Statistical Power Analysis for the Behavioral Sciences 2nd Ed. Lawrence Earlbaum Associates Hillsdale NJ."},{"key":"e_1_2_1_26_1","unstructured":"CompuServe I. 1987. Graphics Interchange Format (Vol. GIF87). World Wide Web Consortium.  CompuServe I. 1987. Graphics Interchange Format (Vol. GIF87). World Wide Web Consortium."},{"key":"e_1_2_1_27_1","unstructured":"Consortium. 2010. Web security context: User interface guidelines. World Wide Web Consortium.  Consortium. 2010. Web security context: User interface guidelines. World Wide Web Consortium."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/13669870110062712"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Cox E. P. and Wogalter M. S. 2006. Warning source. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 111--122.  Cox E. P. and Wogalter M. S. 2006. Warning source. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 111--122.","DOI":"10.1201\/9781482289688"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Daly S. 1993. The visible differences predictor: An algorithm for the assessment of image fidelity. In Digital Images and Human Vision A. B. Watson Ed. MIT Press Cambridge MA 179--206.   Daly S. 1993. The visible differences predictor: An algorithm for the assessment of image fidelity. In Digital Images and Human Vision A. B. Watson Ed. MIT Press Cambridge MA 179--206.","DOI":"10.1117\/12.135952"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193128703100112"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_2_1_33_1","unstructured":"Dorner D. Ed. 1996. The Logic of Failure: Recognizing and Avoiding Error in Complex Situations. Metropolitan Books New York NY.  Dorner D. Ed. 1996. The Logic of Failure: Recognizing and Avoiding Error in Complex Situations . Metropolitan Books New York NY."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_2_1_35_1","unstructured":"Emigh A. 2005. Online Identity Theft: Phishing Technology Chokepoints and Countermeasures. Radix Labs Incline Village NV.  Emigh A. 2005. Online Identity Theft: Phishing Technology Chokepoints and Countermeasures . Radix Labs Incline Village NV."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"volume-title":"Proceedings of LA-WEB.","author":"Fetterly D.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","unstructured":"Fossi M. Johnson E. Turner D. Mack T. Blackbird J. McKinney D. Low M. K. Adams T. Laucht M. P. and Gough J. 2008. Symantec report on the underground economy. Symantec Corporation Cupertino CA.  Fossi M. Johnson E. Turner D. Mack T. Blackbird J. McKinney D. Low M. K. Adams T. Laucht M. P. and Gough J. 2008. Symantec report on the underground economy. Symantec Corporation Cupertino CA."},{"volume-title":"Handbook of Warnings","author":"Frascara J.","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"volume-title":"Proceedings of the 3rd IEEE International Conference on Software Engineering and Service Science.","author":"Gao Y.","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PSES.2011.6088248"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Gordon I. E. 2004. Theories of Visual Perception 3rd Ed. Psychology Press New York NY.  Gordon I. E. 2004. Theories of Visual Perception 3rd Ed. Psychology Press New York NY.","DOI":"10.4324\/9780203502259"},{"key":"e_1_2_1_45_1","first-page":"1","article-title":"Gestalt theory in interactive media design","volume":"2","author":"Graham L.","year":"2008","journal-title":"J. Hum. Soc. Sci."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511502"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148222"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480504"},{"key":"e_1_2_1_50_1","unstructured":"Hescott B. and Koulomzin D. 2007. On clustering images using compression. Boston University Computer Science Department.  Hescott B. and Koulomzin D. 2007. On clustering images using compression. Boston University Computer Science Department."},{"volume-title":"PNG (Portable Network Graphics) Specification (Vol. RFC","year":"1996","author":"IESG.","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Jiang S. Song X. and Huang Q. 2013. Relative image similarity learning with contextual information for Internet cross-media retrieval. Multimedia Syst.  Jiang S. Song X. and Huang Q. 2013. Relative image similarity learning with contextual information for Internet cross-media retrieval. Multimedia Syst .","DOI":"10.1007\/s00530-012-0299-4"},{"volume-title":"Proceedings of the SeFun International Seminar: Design Semiotics in Use.","year":"2007","author":"Kalviainen M.","key":"e_1_2_1_54_1"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti806"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1599272.1599279"},{"volume-title":"Handbook of Warnings","author":"Lesch M. F.","key":"e_1_2_1_57_1"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_81"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838101"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078838"},{"key":"e_1_2_1_61_1","unstructured":"Lubin J. 1993. The use of psychophysical data and models in the analysis of display system performance. In Digital Images and Human Vision A. B. Watson Ed. MIT Press Cambridge MA 163--178.   Lubin J. 1993. The use of psychophysical data and models in the analysis of display system performance. In Digital Images and Human Vision A. B. Watson Ed. MIT Press Cambridge MA 163--178."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2008.06.006"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108867"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223683"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/10803548.2011.11076871"},{"volume-title":"Handbook of Warnings","author":"Meyer J.","key":"e_1_2_1_66_1"},{"key":"e_1_2_1_67_1","unstructured":"Paab G. Reinhardt W. Ruping S. and Wrobel S. 2008. Data mining for security and crime detection. In Security Informatics and Terrorism: Patrolling the Web C. S. Gal P. B. Kantor and B. Shapira Eds. IOS Press Amsterdam The Netherlands 56--70.  Paab G. Reinhardt W. Ruping S. and Wrobel S. 2008. Data mining for security and crime detection. In Security Informatics and Terrorism: Patrolling the Web C. S. Gal P. B. Kantor and B. Shapira Eds. IOS Press Amsterdam The Netherlands 56--70."},{"key":"e_1_2_1_68_1","unstructured":"Pappas T. and Safranek R. 2000. Perceptual criteria for image quality evaluation. In Handbook of Image and Video Processing A. C. Bovik Ed. Academic Press San Diego CA 669--684.  Pappas T. and Safranek R. 2000. Perceptual criteria for image quality evaluation. In Handbook of Image and Video Processing A. C. Bovik Ed. Academic Press San Diego CA 669--684."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/573326"},{"volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Provost F.","key":"e_1_2_1_70_1"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459357"},{"volume-title":"Proceedings of the IEEE International Conference Intelligence and Security Informatics.","author":"Ramanathan V.","key":"e_1_2_1_72_1"},{"key":"e_1_2_1_73_1","unstructured":"Rogers E. 1995. Diffusion of Innovations 4th Ed. Free Press New York NY.  Rogers E. 1995. Diffusion of Innovations 4th Ed. Free Press New York NY."},{"volume-title":"Proceedings of the International Conference Security and Privacy in Communications Networks.","author":"Rosiello A. P. E.","key":"e_1_2_1_74_1"},{"key":"e_1_2_1_75_1","unstructured":"Rousseau G. K. and Wogalter M. S. 2006. Research on warning signs. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 147--158.  Rousseau G. K. and Wogalter M. S. 2006. Research on warning signs. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 147--158."},{"key":"e_1_2_1_76_1","volume-title":"Data Compression: The Complete Reference","author":"Salomon D.","year":"2007","edition":"4"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2006.13"},{"key":"e_1_2_1_79_1","unstructured":"Smith-Jackson T. L. and Wogalter M. S. 2006. Methods and procedures in warning research. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 23--33.  Smith-Jackson T. L. and Wogalter M. S. 2006. Methods and procedures in warning research. In Handbook of Warnings M. S. Wogalter Ed. Lawrence Erlbaum Associates Mahwah NJ 23--33."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"key":"e_1_2_1_81_1","unstructured":"Staff. 2007. Issues in Using DNS Whois data for phishing site take down. AntiPhishing Working Group DNS Policy Committee Lexington MA.  Staff. 2007. Issues in Using DNS Whois data for phishing site take down. AntiPhishing Working Group DNS Policy Committee Lexington MA."},{"key":"e_1_2_1_82_1","unstructured":"Staff. 2008a. Mozilla Thunderbird. http:\/\/www.mozilla.com\/en-US\/thunderbird\/.  Staff. 2008a. Mozilla Thunderbird. http:\/\/www.mozilla.com\/en-US\/thunderbird\/."},{"key":"e_1_2_1_83_1","unstructured":"Staff. 2008b. Phishing activity trends report for the month of January 2008. Anti-Phishing Working Group Lexington MA.  Staff. 2008b. Phishing activity trends report for the month of January 2008. Anti-Phishing Working Group Lexington MA."},{"key":"e_1_2_1_84_1","unstructured":"Staff. 2009. Convert HTML to Image. http:\/\/www.converthtmltoimage.com\/.  Staff. 2009. Convert HTML to Image. http:\/\/www.converthtmltoimage.com\/."},{"key":"e_1_2_1_85_1","unstructured":"Staff. 2010. Cybercriminals creating 57 000 fake Web sites every week. SecurityWeek.  Staff. 2010. Cybercriminals creating 57 000 fake Web sites every week. SecurityWeek ."},{"volume-title":"Alexa: The Web Information Company","year":"2011","author":"Staff","key":"e_1_2_1_86_1"},{"key":"e_1_2_1_87_1","unstructured":"Staff. 2011b. PhishTank. http:\/\/www.phishtank.com\/.  Staff. 2011b. PhishTank. http:\/\/www.phishtank.com\/."},{"key":"e_1_2_1_88_1","unstructured":"Staff. 2011c. RSA Identity Protection and Verification Suite. http:\/\/www.rsa.com\/node.aspx?id=3017.  Staff. 2011c. RSA Identity Protection and Verification Suite. http:\/\/www.rsa.com\/node.aspx?id=3017."},{"key":"e_1_2_1_89_1","unstructured":"Staff. 2012a. Safe Browsing API. https:\/\/developers.google.com\/safe-browsing\/.  Staff. 2012a. Safe Browsing API. https:\/\/developers.google.com\/safe-browsing\/."},{"volume-title":"Trend Micro Incorporated Research Papers, TrendLabs APT Research Team","author":"Staff","key":"e_1_2_1_90_1"},{"key":"e_1_2_1_91_1","unstructured":"Staff. 2012c. Warning Messages. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa511263.aspx.  Staff. 2012c. Warning Messages. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa511263.aspx."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1198\/TECH.2010.07032"},{"volume-title":"JPEG2000---Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers","author":"Taubman D. S.","key":"e_1_2_1_93_1"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2007.01.024"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.260"},{"key":"e_1_2_1_96_1","doi-asserted-by":"crossref","unstructured":"Wang Z. and Bovik A. C. 2006. Modern Image Quality Assessment. Morgan & Claypool New York NY.  Wang Z. and Bovik A. C. 2006. Modern Image Quality Assessment . Morgan & Claypool New York NY.","DOI":"10.1007\/978-3-031-02238-8"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.103"},{"key":"e_1_2_1_99_1","first-page":"946","article-title":"Dctune: A technique for visual optimization of DCT quantization matrices for individual images","volume":"24","author":"Watson A. B.","year":"1993","journal-title":"Society for Information Display Digest Technology Papers"},{"volume-title":"Handbook of Warnings","author":"Wogalter M. S.","key":"e_1_2_1_100_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781482289688"},{"volume-title":"Handbook of Warnings","author":"Wogalter M. S.","key":"e_1_2_1_101_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781482289688"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v59:4"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435215.2435216"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526786"},{"key":"e_1_2_1_106_1","doi-asserted-by":"crossref","unstructured":"Xiang G. Hong J. Cranor L. and Rose C. P. 2011. CANTINA+: A feature-rich machine learning framework for detecting phishing Web sites. http:\/\/www.cs.cmu.edu\/~jasonh\/publications\/acmtissec2010-cantina-journal-submitted.pdf.  Xiang G. Hong J. Cranor L. and Rose C. P. 2011. CANTINA+: A feature-rich machine learning framework for detecting phishing Web sites. http:\/\/www.cs.cmu.edu\/~jasonh\/publications\/acmtissec2010-cantina-journal-submitted.pdf.","DOI":"10.1145\/2019599.2019606"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754395"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.66"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2584680","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2584680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:43Z","timestamp":1750230103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2584680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":110,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1145\/2584680"],"URL":"https:\/\/doi.org\/10.1145\/2584680","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2014,4]]},"assertion":[{"value":"2013-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}