{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:18:42Z","timestamp":1767374322915,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":26,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2676585.2676596","type":"proceedings-article","created":{"date-parts":[[2015,1,16]],"date-time":"2015-01-16T19:18:59Z","timestamp":1421435939000},"page":"280-285","source":"Crossref","is-referenced-by-count":6,"title":["Detecting phishing web pages based on DOM-tree structure and graph matching algorithm"],"prefix":"10.1145","author":[{"given":"Le Dang","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Dac-Nhuong","family":"Le","sequence":"additional","affiliation":[]},{"given":"Le Trong","family":"Vinh","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2676585.2676596-1","unstructured":"F. Schneider, N. Provos, R. Moll, M. Chew, and B. Rakowsk. Phishing Protection Design Documentation. http:\/\/wiki.mozilla.org\/Phishing.Protection: Design Documentation. 2007."},{"key":"key-10.1145\/2676585.2676596-2","doi-asserted-by":"crossref","unstructured":"Dhamija R. Tygar J D. The battle against phishing: Dynamic security skins\/\/Proceedings of the Symposium on Usable Privacy and Security. Pittsburg, Pennsylvania, 2005: 77--88.","DOI":"10.1145\/1073001.1073009"},{"key":"key-10.1145\/2676585.2676596-3","doi-asserted-by":"crossref","unstructured":"Inomata A. Rahman M, Okamoto T, Okamoto E. A novel mail filtering method against phishing\/\/Proceedings of the Conference on Communications, Computers and signal Processing 2005: 221--224.","DOI":"10.1109\/PACRIM.2005.1517265"},{"key":"key-10.1145\/2676585.2676596-4","doi-asserted-by":"crossref","unstructured":"Madhusudhanan Chandrasekaran. Ramkumar Chinchani. Shambhu Upadhyaya. PHONEY: Mimicking user response to detect phishing attacks\/\/Proceedings of the 2006 International Symposium on World of Wireless. Mobile and Multimedia Networks Table of Contents. Washington. DC. USA: IEEE Computer Society. 2006: 668--672.","DOI":"10.1109\/WOWMOM.2006.87"},{"key":"key-10.1145\/2676585.2676596-5","doi-asserted-by":"crossref","unstructured":"Choi Daeseon, Jin Seunghun, Yoon Hyunsoo. A method for preventing the leakage of the personal information on the Internet\/\/Proceedings of the 8th International Conference. Advanced Communication Technology. Korea, 2006, 2: 20--22.","DOI":"10.1109\/ICACT.2006.206185"},{"key":"key-10.1145\/2676585.2676596-6","doi-asserted-by":"crossref","unstructured":"Pan Ying, Ding Xuhua. Anomaly based Web phishing page detection\/\/Proceedings of the 22ndAnnual Computer Security Applications Conference. Washington, DC, USA, 2006: 381--393.","DOI":"10.1109\/ACSAC.2006.13"},{"key":"key-10.1145\/2676585.2676596-7","doi-asserted-by":"crossref","unstructured":"Fu Anthony Y, L W, Deng Xiaotie. Detecting phishing Web pages with visual similarity assessment based on earth mover's distance(EMD). IEEE Transaction on Dependable and Secure Computing, 2006, 3(4): 301--311.","DOI":"10.1109\/TDSC.2006.50"},{"key":"key-10.1145\/2676585.2676596-8","unstructured":"Liu W, G H, Liu X, Zhang M, Deng X. Phishing Webpage detection\/\/Proceedings of the 8th International Conference on Documents Analysis and Recognition, Seoul, Korea, 2005: 56--564."},{"key":"key-10.1145\/2676585.2676596-9","unstructured":"Microsoft. Sender ID Home Page. http:\/\/www.siteadvisor.com\/mscorp\/safety\/techologies\/."},{"key":"key-10.1145\/2676585.2676596-10","unstructured":"Yahoo. Yahoo! AntiSpam Resource Center. http:\/\/antispam.yahoo.com\/domainkeys, 2007."},{"key":"key-10.1145\/2676585.2676596-11","unstructured":"W3C. Document Object Model. http:\/\/www.w3. org\/TR\/2004\/RECDOM-Level-3-Core-20040407\/core.html, 2007."},{"key":"key-10.1145\/2676585.2676596-12","doi-asserted-by":"crossref","unstructured":"E. Kirda and C. Kruegel. Protecting Users against Phishing Attacks. The Computer Journal, 2006.","DOI":"10.1093\/comjnl\/bxh169"},{"key":"key-10.1145\/2676585.2676596-13","unstructured":"J.-Y. Chen, and K.-T. Chen, A Robust Local Feature-based Scheme for Phishing Page Detection and Discrimination, Web 2.0 Trust 2008."},{"key":"key-10.1145\/2676585.2676596-14","doi-asserted-by":"crossref","unstructured":"F. Harary. Graph Theory. Addison-Wesley, 1969.","DOI":"10.21236\/AD0705364"},{"key":"key-10.1145\/2676585.2676596-15","doi-asserted-by":"crossref","unstructured":"Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel and Fabrizio FerrandA. P. E. Rosiello, E. Kirda, C. Kruegel, F. Ferr, P. D. Milano, and P. D. Milanoi, A Layout-Similarity-Based Approach for Detecting Phishing Pages. in SecureComm '07: Proceedings of the 3rd IEEE International Conference on Security and Privacy in Communication Networks, 2007.","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"key-10.1145\/2676585.2676596-16","unstructured":"Le Dang Nguyen, Dac-Nhuong Le, Tran Thi Huong, Le Trong Vinh A New Genetic Algorithm Applied to Inexact Graph Matching, International Journal of Computer Science and Telecommunications, Vol. 5 No. 5, pp. 1--6, 2014."},{"key":"key-10.1145\/2676585.2676596-17","doi-asserted-by":"crossref","unstructured":"Hua Wang, Yang Zhang, \"Web Data Extraction Based on Simple Tree Matching,\", IEEE, 2010, pp. 15--18","DOI":"10.1109\/ICIE.2010.100"},{"key":"key-10.1145\/2676585.2676596-18","unstructured":"Report a Phishing website, http:\/\/www.phishtank.com"},{"key":"key-10.1145\/2676585.2676596-19","unstructured":"Netcraft, \"http:\/\/toolbar.netcraft.com\/\", Dec 2004"},{"key":"key-10.1145\/2676585.2676596-20","doi-asserted-by":"crossref","unstructured":"Y. Pan and X. Ding, \"Anomaly BasedWeb Phishing Page Detection,\" Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), Computer Society, 2006.","DOI":"10.1109\/ACSAC.2006.13"},{"key":"key-10.1145\/2676585.2676596-21","unstructured":"Anti-Phishing Working Group. Phishing Activity Trends Report, http:\/\/antiphishing.org\/reports\/apwg_report_sep2007_final.pdf. &lt;u&gt;September 2007&lt;\/u&gt;."},{"key":"key-10.1145\/2676585.2676596-22","doi-asserted-by":"crossref","unstructured":"R. Dhamija and J. D. Tygar, \"The Battle against Phishing: Dynamic Security Skins,\" Proc. Symp. Usable Privacy and Security, 2005.","DOI":"10.1145\/1073001.1073009"},{"key":"key-10.1145\/2676585.2676596-23","doi-asserted-by":"crossref","unstructured":"M. Wu, R. C. Miller and G. Little, \"Web Wallet: Preventing Phishing Attacks by Revealing User Intentions,\" MIT Computer Science and Artificial Intelligence Lab, 2006","DOI":"10.1145\/1143120.1143133"},{"key":"key-10.1145\/2676585.2676596-24","doi-asserted-by":"crossref","unstructured":"A. Y. Fu, L. Wenyin and X. Deng, \"Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD),\" IEEE transactions on dependable and secure computing, vol. 3, no. 4, 2006","DOI":"10.1109\/TDSC.2006.50"},{"key":"key-10.1145\/2676585.2676596-25","doi-asserted-by":"crossref","unstructured":"W. Liu, G. Huang, X. Liu, M. Zhang, and X. Deng, \"Phishing Web Page Detection,\" Proc. Eighth Int'l Conf. Documents Analysis and Recognition, pp. 560--564, 2005","DOI":"10.1109\/ICDAR.2005.190"},{"key":"key-10.1145\/2676585.2676596-26","unstructured":"W. Liu, X. Deng, G. Huang and A. Y. Fu, \"An Antiphishing Strategy Based on Visual Similarity Assessment,\" Published by the IEEE Computer Society 1089-7801\/06 IEEE, INTERNET COMPUTING IEEE, 2006."}],"event":{"name":"the Fifth Symposium","start":{"date-parts":[[2014,12,4]]},"number":"5","location":"Hanoi, Viet Nam","end":{"date-parts":[[2014,12,5]]},"acronym":"SoICT '14"},"container-title":["Proceedings of the Fifth Symposium on Information and Communication Technology - SoICT '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676585.2676596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2676596&amp;ftid=1529188&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:30Z","timestamp":1750277670000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2676585.2676596"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1145\/2676585.2676596","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}