{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:16:42Z","timestamp":1775470602500,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325927","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"154-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["PhAttApp"],"prefix":"10.1145","author":[{"given":"Thuy","family":"Lam","sequence":"first","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA and Orange County Water District, Fountain Valley, California, USA"}]},{"given":"Houssain","family":"Kettani","sequence":"additional","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2018 security report: Welcome to the future of cyber security. Check Point Research","author":"Checkpoint","year":"2018","unstructured":"Checkpoint . ( 2018 ). 2018 security report: Welcome to the future of cyber security. Check Point Research . San Carlos, CA : Check Point Software Technologies Limited . https:\/\/www.checkpoint.com\/downloads\/product-related\/report\/2018-security-report.pdf Checkpoint. (2018). 2018 security report: Welcome to the future of cyber security. Check Point Research. San Carlos, CA: Check Point Software Technologies Limited. https:\/\/www.checkpoint.com\/downloads\/product-related\/report\/2018-security-report.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"ENISA threat landscape report 2017: 15 top cyber-threats and trends. Heraklion: ENISA","author":"European Union Agency for Network and Information Security (ENISA).","year":"2018","unstructured":"European Union Agency for Network and Information Security (ENISA). ( 2018 ). ENISA threat landscape report 2017: 15 top cyber-threats and trends. Heraklion: ENISA . European Union Agency for Network and Information Security (ENISA). (2018). ENISA threat landscape report 2017: 15 top cyber-threats and trends. Heraklion: ENISA."},{"key":"e_1_3_2_1_3_1","volume-title":"Social engineering: The art of human hacking","author":"Hadnagy C.","year":"2010","unstructured":"Hadnagy , C. ( 2010 ). Social engineering: The art of human hacking . Indianapolis, IN : John Wiley & Sons . Hadnagy, C. (2010). Social engineering: The art of human hacking. Indianapolis, IN: John Wiley & Sons."},{"key":"e_1_3_2_1_4_1","volume-title":"IBM security services 2014 cyber security intelligence index: Analysis of cyber-attack and incident data from IBM's worldwide security operations (Report No. SE303058-USEN-02)","author":"Security Services","year":"2014","unstructured":"IBM Security Services . ( 2014 ). IBM security services 2014 cyber security intelligence index: Analysis of cyber-attack and incident data from IBM's worldwide security operations (Report No. SE303058-USEN-02) . Somers, NY : IBM Corporation . IBM Security Services. (2014). IBM security services 2014 cyber security intelligence index: Analysis of cyber-attack and incident data from IBM's worldwide security operations (Report No. SE303058-USEN-02). Somers, NY: IBM Corporation."},{"key":"e_1_3_2_1_5_1","volume-title":"Protect yourself against the top 3 cyber threats of","author":"Tierney S.","year":"2018","unstructured":"Tierney , S. (2018, January 8). Protect yourself against the top 3 cyber threats of 2018 . Microsoft Industry Blogs -- United Kingdom . https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-gb\/industry\/financial-services\/protect-yourself-against-the-top-3-cyber-threats-of-2018\/ Tierney, S. (2018, January 8). Protect yourself against the top 3 cyber threats of 2018. Microsoft Industry Blogs -- United Kingdom. https:\/\/cloudblogs.microsoft.com\/industry-blog\/en-gb\/industry\/financial-services\/protect-yourself-against-the-top-3-cyber-threats-of-2018\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Pauli D. (2015 November 9). Cryptowall 4.0: Update makes world's worst ransomware worse still now you won't even know what files are encrypted. The Register. https:\/\/www.theregister.co.uk\/2015\/11\/09\/cryptowall_40\/  Pauli D. (2015 November 9). Cryptowall 4.0: Update makes world's worst ransomware worse still now you won't even know what files are encrypted. The Register. https:\/\/www.theregister.co.uk\/2015\/11\/09\/cryptowall_40\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.154"},{"key":"e_1_3_2_1_8_1","volume-title":"PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach. Eleventh International Multi-Conference on Information Processing-2015","author":"Rao","year":"2015","unstructured":"Rao , Srinivasa, & Ali , T. ( 2015 ). PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach. Eleventh International Multi-Conference on Information Processing-2015 Rao, Srinivasa, & Ali, T. (2015). PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach. Eleventh International Multi-Conference on Information Processing-2015"},{"key":"e_1_3_2_1_9_1","volume-title":"New Mexico 87801, USA","author":"Sung A.","year":"2008","unstructured":"Sung A. , Basnet , R. ,& Mukkamala S. ( 2008 ). Detection of Phishing Attacks: A Machine Learning Approach. New Mexico Tech , New Mexico 87801, USA Sung A., Basnet, R.,& Mukkamala S. (2008). Detection of Phishing Attacks: A Machine Learning Approach. New Mexico Tech, New Mexico 87801, USA"},{"key":"e_1_3_2_1_10_1","unstructured":"Toole S. (2016 June 27). Widespread attack on Office 365 corporate users with zero-day ransomware virus. Avanan. https:\/\/www.avanan.com\/resources\/attack-on-office-365-corporate-users-with-zero-day-ransomware-virus  Toole S. (2016 June 27). Widespread attack on Office 365 corporate users with zero-day ransomware virus. Avanan. https:\/\/www.avanan.com\/resources\/attack-on-office-365-corporate-users-with-zero-day-ransomware-virus"},{"key":"e_1_3_2_1_11_1","volume-title":"2018 data breach investigations report","author":"Verizon","year":"2018","unstructured":"Verizon . ( 2018 ). 2018 data breach investigations report ( 11 th ed.). New York, NY : Verizon . http:\/\/www.verizonenterprise.com\/DBIR2018 Verizon. (2018). 2018 data breach investigations report (11th ed.). New York, NY: Verizon. http:\/\/www.verizonenterprise.com\/DBIR2018","edition":"11"}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","location":"Houston TX USA","acronym":"ICISDM 2019","sponsor":["University of Houston"]},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325927"}},"subtitle":["A Phishing Attack Detection Application"],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":11,"alternative-id":["10.1145\/3325917.3325927","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325927","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}