{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:32:20Z","timestamp":1762522340635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T00:00:00Z","timestamp":1562457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,7]]},"DOI":"10.1145\/3343147.3343154","type":"proceedings-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T19:51:28Z","timestamp":1565985088000},"page":"84-89","source":"Crossref","is-referenced-by-count":8,"title":["PhishLedger"],"prefix":"10.1145","author":[{"given":"Dongjie","family":"Liu","sequence":"first","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, China, Beijing, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yaling","family":"Tan","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Symantec Corporation.2015. Symantec intelligence report {online}.Available: https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-intelligence-report-01-2015-en-us.pdf  Symantec Corporation.2015. Symantec intelligence report {online}.Available: https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-intelligence-report-01-2015-en-us.pdf"},{"volume-title":"In: Bajwa I., Kamareddine F., Costa A. (eds) Intelligent Technologies and Applications. INTAP","year":"2019","author":"Khalid J.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-016-0064-3"},{"key":"e_1_3_2_1_4_1","unstructured":"APWG. 2018. ICANN's temporary specification survey{online}. Available: https:\/\/apwg.org\/apwg-news-center\/icann-whois-access\/temporySpecSurvey  APWG. 2018. ICANN's temporary specification survey{online}. Available: https:\/\/apwg.org\/apwg-news-center\/icann-whois-access\/temporySpecSurvey"},{"key":"e_1_3_2_1_5_1","article-title":"CBR-PDS: A case-based reasoning phishing detection system","author":"Abutair H.","year":"2018","journal-title":"Journal of Ambient Intelligence and Humanized Computing."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Rao R.S. Pais A. R. 2018. Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications.  Rao R.S. Pais A. R. 2018. Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications.","DOI":"10.1007\/s00521-017-3305-0"},{"volume-title":"In: Conti, M., Somani, G., Poovendran R. (eds) Versatile Cybersecurity. Advances in Information Security, vol 72","year":"2018","author":"Heartfield R.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"IETF. 2010. RFC5901. Extensions to the IODEF-document class for reporting phishing{online}. Available: https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc5901.txt.pdf.  IETF. 2010. RFC5901. Extensions to the IODEF-document class for reporting phishing{online}. Available: https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc5901.txt.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"IETF. 2010. RFC5941. Sharing transaction fraud data. {online}. Available: https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc5941.txt.pdf.  IETF. 2010. RFC5941. Sharing transaction fraud data. {online}. Available: https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc5941.txt.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"China Telecom Professional Network. 2016. YD\/T 3038--2016. Technical requirements for a data exchange protocol for phishing attacks reporting{online}. Available: http:\/\/www.bzfxw.com\/e\/DownSys\/DownSoft\/?classid=109&id=328542  China Telecom Professional Network. 2016. YD\/T 3038--2016. Technical requirements for a data exchange protocol for phishing attacks reporting{online}. Available: http:\/\/www.bzfxw.com\/e\/DownSys\/DownSoft\/?classid=109&id=328542"},{"key":"e_1_3_2_1_11_1","unstructured":"Geersdaele F.V. 2015. The promise of the blockchain: The trust machine. The Economist. Available online: https:\/\/www.economist.com\/leaders\/2015\/10\/31\/the-trust-machine.  Geersdaele F.V. 2015. The promise of the blockchain: The trust machine. The Economist. Available online: https:\/\/www.economist.com\/leaders\/2015\/10\/31\/the-trust-machine."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3271467"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3286500"},{"key":"e_1_3_2_1_17_1","unstructured":"The Linux Foundation. 2018. The Linux Foundation helps Hyperledger build the most vibrant open source ecosystem for blockchain{online}. Available: https:\/\/www.linuxfoundation.org\/projects\/case-studies\/hyperledger\/.  The Linux Foundation. 2018. The Linux Foundation helps Hyperledger build the most vibrant open source ecosystem for blockchain{online}. Available: https:\/\/www.linuxfoundation.org\/projects\/case-studies\/hyperledger\/."},{"volume-title":"IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).","author":"Thakkar P.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"APWG. 2019. Phishing Activity Trends Report 4th Quarter 2018{online}. Available: http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2018.pdf.  APWG. 2019. Phishing Activity Trends Report 4th Quarter 2018{online}. Available: http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2018.pdf.","DOI":"10.1016\/S1361-3723(19)30025-9"}],"event":{"name":"IECC ' 19: 2019 International Electronics Communication Conference","acronym":"IECC ' 19","location":"Okinawa Japan"},"container-title":["Proceedings of the 2019 International Electronics Communication Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343154","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3343147.3343154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:05Z","timestamp":1750201985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343154"}},"subtitle":["A Decentralized Phishing Data Sharing Mechanism"],"short-title":[],"issued":{"date-parts":[[2019,7,7]]},"references-count":19,"alternative-id":["10.1145\/3343147.3343154","10.1145\/3343147"],"URL":"https:\/\/doi.org\/10.1145\/3343147.3343154","relation":{},"subject":[],"published":{"date-parts":[[2019,7,7]]}}}