{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:41:27Z","timestamp":1773326487236,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T00:00:00Z","timestamp":1332720000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/1687-417x-2012-1","type":"journal-article","created":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T12:15:01Z","timestamp":1332764101000},"source":"Crossref","is-referenced-by-count":54,"title":["phishGILLNET\u2014phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training"],"prefix":"10.1186","volume":"2012","author":[{"given":"Venkatesh","family":"Ramanathan","sequence":"first","affiliation":[]},{"given":"Harry","family":"Wechsler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,26]]},"reference":[{"key":"9_CR1","unstructured":"National Data--Deter. Detect. Defend. Avoid ID Theft[ http:\/\/www.ftc.gov\/bcp\/edu\/microsites\/idtheft\/reference-desk\/national-data.html ]"},{"key":"9_CR2","unstructured":"Google Says Phishers Stole E-mail From US Officials, Others, PCWorld Business Center[ http:\/\/www.pcworld.com\/businesscenter\/article\/229202\/google_says_phishers_stole_email_from_us_officials_others.html ]"},{"key":"9_CR3","unstructured":"DNSBL Information--Spam Database Lookup[ http:\/\/www.dnsbl.info\/ ]"},{"key":"9_CR4","unstructured":"Snort--Home Page[ http:\/\/www.snort.org\/ ]"},{"issue":"11","key":"9_CR5","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1049\/el.2011.0399","volume":"47","author":"H Kim","year":"2011","unstructured":"Kim H, Huh JH: Detecting DNS-poisoning-based phishing attacks from their network performance characteristics. Electron Lett 2011,47(11):656-658. 10.1049\/el.2011.0399","journal-title":"Electron Lett"},{"key":"9_CR6","unstructured":"Sender ID[ http:\/\/www.microsoft.com\/mscorp\/safety\/technologies\/senderid\/default.mspx ]"},{"key":"9_CR7","unstructured":"DomainKey Library and Implementor's Tools[ http:\/\/domainkeys.sourceforge.net\/ ]"},{"key":"9_CR8","first-page":"37","volume":"6","author":"H Kim","year":"2005","unstructured":"Kim H, Howland P, Park H: Dimension reduction in text classification with support vector machines. J Mach Learn Res 2005, 6: 37-53.","journal-title":"J Mach Learn Res"},{"key":"9_CR9","unstructured":"SpamAssassin: Welcome to SpamAssassin[ http:\/\/spamassassin.apache.org\/ ]"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/1242572.1242660","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"I Fette","year":"2007","unstructured":"Fette I, Sadeh N, Tomasic A: Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web. Volume 1. Banff, AB, Canada; 2007:649-656."},{"key":"9_CR11","first-page":"60","volume-title":"Proceedings of the eCrime Researchers Summit","author":"S Abu-Nimeh","year":"2007","unstructured":"Abu-Nimeh S, Nappa D, Wang X, Nair S: A comparison of machine learning techniques for phishing detection. In Proceedings of the eCrime Researchers Summit. Volume 1. Pittsburgh, PA, USA; 2007:60-69."},{"key":"9_CR12","first-page":"1","volume-title":"IEEE International Conference on Communications","author":"S Abu-Nimeh","year":"2009","unstructured":"Abu-Nimeh S, Nappa D, Wang X, Nair S: Distributed phishing detection by applying variable selection using Bayesian additive regression trees. In IEEE International Conference on Communications. Volume 1. Dresden, Germany; 2009:1-5."},{"key":"9_CR13","first-page":"539","volume-title":"Proceedings of the 15th International Conference on Advances in Neuro-Information Processing (Springer-Verlag, Heidelberg, 2009)","author":"D Miyamoto","year":"2008","unstructured":"Miyamoto D, Hazeyama H, Kadobayashi Y: An evaluation of machine learning-based methods for detection of phishing sites. In Proceedings of the 15th International Conference on Advances in Neuro-Information Processing (Springer-Verlag, Heidelberg, 2009). Volume 1. Auckland, New Zealand; 2008:539-546."},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2009.5342607","volume-title":"Phishing Detection using Classifier Ensembles","author":"F Toolan","year":"2009","unstructured":"Toolan F, Carthy J: Phishing Detection using Classifier Ensembles. eCrime Researchers Summit, Tacoma, WA, USA; 2009."},{"key":"9_CR15","first-page":"449","volume-title":"Proceedings of the 31st European Conference on IR Research on Advances in Information Retrieval, (Springer-Verlag, Heidelberg, 2009)","author":"WN Gansterer","year":"2009","unstructured":"Gansterer WN, P\u00f6lz D: E-mail classification for phishing defense. In Proceedings of the 31st European Conference on IR Research on Advances in Information Retrieval, (Springer-Verlag, Heidelberg, 2009). Volume 1. Toulouse, France; 2009:449-460."},{"key":"9_CR16","first-page":"1","volume-title":"Proceedings of the Conference on Email and Anti-Spam (CEAS)","author":"A Bergholz","year":"2008","unstructured":"Bergholz A, Chang J-H, Paa\u00df G, Reichartz F, Strobel S: Improved phishing detection using model-based features. In Proceedings of the Conference on Email and Anti-Spam (CEAS). Volume 1. Mountain View, California, USA; 2008:1-10."},{"issue":"1","key":"9_CR17","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3233\/JCS-2010-0371","volume":"18","author":"A Bergholz","year":"2010","unstructured":"Bergholz A, Beer JD, Glahn S, Moens MF, Paa\u00df G, Strobel S: New filtering approaches for phishing email. J Comput Secur 2010,18(1):7-35.","journal-title":"J Comput Secur"},{"key":"9_CR18","first-page":"1","volume-title":"Proceedings of the Conference on Email and Anti-Spam (CEAS)","author":"A Bergholz","year":"2010","unstructured":"Bergholz A, Paa\u00df G, D'Addona L, Dato D: A real-life study in phishing detection. In Proceedings of the Conference on Email and Anti-Spam (CEAS). Volume 1. Redmond, Washington, USA; 2010:1-10."},{"key":"9_CR19","first-page":"1","volume-title":"eCrime Researchers Summit","author":"F Toolan","year":"2010","unstructured":"Toolan F, Carthy J: Feature Selection for Spam and Phishing Detection. In eCrime Researchers Summit. Volume 1. Dallas, Texas, USA; 2010:1-12."},{"key":"9_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030392","volume-title":"A Study of Feature Subset Evaluators and Feature Subset Searching Methods for Phishing Classification","author":"M Khonji","year":"2011","unstructured":"Khonji M, Jones A, Iraqi Y: A Study of Feature Subset Evaluators and Feature Subset Searching Methods for Phishing Classification. CEAS'11, Perth, Australia; 2011."},{"issue":"18","key":"9_CR21","doi-asserted-by":"publisher","first-page":"3301","DOI":"10.3923\/jas.2011.3301.3307","volume":"11","author":"AAD Al-Momani","year":"2011","unstructured":"Al-Momani AAD, Wan TC, Al-Saedi K, Altaher A, Ramadass S, Manasrah A, Melhim LB, Anbar M: An online model on evolving phishing e-mail detection and classification method. J Appl Sci 2011,11(18):3301-3307. 10.3923\/jas.2011.3301.3307","journal-title":"J Appl Sci"},{"key":"9_CR22","first-page":"55","volume-title":"IEEE Symposium on Computation Intelligence in Cyber Security","author":"J Zhan","year":"2011","unstructured":"Zhan J, Thomas L: Phishing detection using stochastic learning based weak estimators. In IEEE Symposium on Computation Intelligence in Cyber Security. Volume 1. Paris, France; 2011:55-59."},{"issue":"1","key":"9_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13278-011-0031-y","volume":"2","author":"J Yearwood","year":"2011","unstructured":"Yearwood J, Mammadov M, Webb D: Profiling phishing activity based on hyperlinks extracted from phishing emails. J Social Netw Anal Mining 2011,2(1):5-16.","journal-title":"J Social Netw Anal Mining"},{"issue":"2","key":"9_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang G, Hong J, Rose CP, Cranor L: A feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inf Syst Secur 2011,14(2):1-28. Article 21","journal-title":"ACM Trans Inf Syst Secur"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/2030376.2030389","volume-title":"Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference","author":"M Khonji","year":"2011","unstructured":"Khonji M, Iraqi Y, Jones A: Lexical URL analysis for discriminating phishing and legitimate websites. In Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference. Volume 1. Perth, Australia; 2011:109-115."},{"issue":"10","key":"9_CR26","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TNN.2011.2161999","volume":"22","author":"H Zhang","year":"2011","unstructured":"Zhang H, Liu G, Chow TWS, Liu W: Textual and visual content-based anti-phishing: a Bayesian approach. IEEE Trans Neural Netw 2011,22(10):1532-1546.","journal-title":"IEEE Trans Neural Netw"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1145\/2030376.2030396","volume-title":"Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference","author":"CH Hsu","year":"2011","unstructured":"Hsu CH, Wang P, Pu S: Identify fixed-path phishing attack by STC. In Proceedings of 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference. Volume 1. Perth, Australia; 2011:172-175."},{"key":"9_CR28","first-page":"221","volume-title":"IEEE GCC Conference and Exhibition","author":"M Khonji","year":"2011","unstructured":"Khonji M, Jones A, Iraqi Y: A novel phishing classification based on URL features. In IEEE GCC Conference and Exhibition. Volume 1. Dubai, UAE; 2011:221-224."},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MIC.2011.103","volume":"16","author":"L Wenyin","year":"2011","unstructured":"Wenyin L, Liu G, Qiu B, Quan X: Anti-phishing through phishing target discovery. IEEE J Internet Comput 2011,16(2):52-61.","journal-title":"IEEE J Internet Comput"},{"key":"9_CR30","unstructured":"SpoofGuard[ http:\/\/crypto.stanford.edu\/SpoofGuard\/ ]"},{"key":"9_CR31","unstructured":"Cordero A, Blain T: Catching phish: detecting phishing attacks from rendered website images.[ http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.92.9084&rep=rep1&type=pdf ]"},{"key":"9_CR32","unstructured":"CallingID--Your Protection from Identity Theft, Fraud, Scams and Malware[ http:\/\/www.callingid.com\/Default.aspx ]"},{"key":"9_CR33","unstructured":"CloudMark[ http:\/\/www.cloudmark.com\/en\/products\/cloudmark-desktopone\/index ]"},{"key":"9_CR34","unstructured":"Netcraft Anti-Phishing Toolbar[ http:\/\/toolbar.netcraft.com\/ ]"},{"key":"9_CR35","unstructured":"FirePhish[ https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/firephish-anti-phishing-extens\/ ]"},{"key":"9_CR36","unstructured":"eBay Toolbar[ http:\/\/download.cnet.com\/eBay-Toolbar\/3000-12512_4-10153544.html?tag=contentMain;downloadLinks ]"},{"key":"9_CR37","unstructured":"IE Phishing Filter[ http:\/\/support.microsoft.com\/kb\/930168 ]"},{"key":"9_CR38","first-page":"1","volume-title":"IEEE Global Telecommunications Conference","author":"S Ab-Nimeh","year":"2008","unstructured":"Ab-Nimeh S, Nair S: Bypassing security toolbars and phishing filters via DNS poisoning. In IEEE Global Telecommunications Conference. Volume 1. New Orleans, Louisiana, USA; 2008:1-6."},{"issue":"7","key":"9_CR39","first-page":"28","volume":"1","author":"A Jain","year":"2011","unstructured":"Jain A, Richariya V: Implementing a web browser with phishing detection techniques. World Comput Sci Inf Technol J 2011,1(7):28-291.","journal-title":"World Comput Sci Inf Technol J"},{"key":"9_CR40","volume-title":"Vancouver, BC, Canada","author":"E Lin","year":"2011","unstructured":"Lin E, Greenberg S, Trotter E, Ma D, Aycok J: Does domain highlighting help people identify phishing sites? CHI 2011. Vancouver, BC, Canada 2011. Accessed 21 July 2011 [ http:\/\/survey.mailfrontier.com\/survey\/phishing_uk.html ]"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-20633-7_18","volume-title":"Proc of the 6th International Conference on Service-Oriented Perspectives in Design Science Research (Springer-Verlag, Berlin, 2011)","author":"Y Chen","year":"2011","unstructured":"Chen Y, Zahedi F, Abbasi A: Interface design elements for anti-phishing systems. In Proc of the 6th International Conference on Service-Oriented Perspectives in Design Science Research (Springer-Verlag, Berlin, 2011). Volume 1. Milwaukee, Wisconsin, USA; 2011:253-265."},{"key":"9_CR42","volume-title":"Phishing on mobile devices. Web 2.0 Security and Privacy Workshop","author":"AP Felt","year":"2011","unstructured":"Felt AP, Wagner D: Phishing on mobile devices. Web 2.0 Security and Privacy Workshop. 2011."},{"key":"9_CR43","unstructured":"MailFrontier Phishing IQ Test--UK Edition[ http:\/\/survey.mailfrontier.com\/survey\/phishing_uk.html ]"},{"key":"9_CR44","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/1140124.1140187","volume-title":"Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education","author":"SA Robila","year":"2006","unstructured":"Robila SA, Ragucci JW: Don't be a phish: steps in user education. In Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education. Volume 1. Bologna, Italy; 2006:237-241."},{"key":"9_CR45","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic TN, Johnson NA, Jakobsson M, Menczer F: Social phishing Commun ACM. 2007, 50: 94-100.","journal-title":"Social phishing Commun ACM"},{"key":"9_CR46","first-page":"485","volume-title":"IEEE International Conference on Information Society","author":"NAG Arachchilage","year":"2011","unstructured":"Arachchilage NAG, Cole M: Design a mobile game for home computer users to prevent from phishing attacks. In IEEE International Conference on Information Society. Volume 1. London, UK; 2011:485-489."},{"key":"9_CR47","first-page":"6390","volume-title":"IEEE International Conference on Electrical and Control Engineering","author":"SS Tseng","year":"2011","unstructured":"Tseng SS, Chen KY, Lee TJ, Weng JY: Automatic content generation for anti-phishing education game. In IEEE International Conference on Electrical and Control Engineering. Volume 1. Yichang, China; 2011:6390-6394."},{"issue":"1","key":"9_CR48","first-page":"45","volume":"81","author":"T Moore","year":"2011","unstructured":"Moore T, Clayton R: The impact of public information on phishing attack and defense. Commun Strat 2011,81(1):45-68.","journal-title":"Commun Strat"},{"key":"9_CR49","unstructured":"Gillnet--Wikipedia[ http:\/\/en.wikipedia.org\/wiki\/Gillnet ]"},{"key":"9_CR50","unstructured":"The Porter Stemming Algorithm[ http:\/\/tartarus.org\/~martin\/PorterStemmer\/ ]"},{"key":"9_CR51","unstructured":"WordNet[ http:\/\/wordnet.princeton.edu\/ ]"},{"key":"9_CR52","unstructured":"Google Suggest API[ http:\/\/code.google.com\/p\/google-refine\/wiki\/SuggestApi ]"},{"key":"9_CR53","unstructured":"Levenshtein distance[ http:\/\/en.wikipedia.org\/wiki\/Levenshtein_distance ]"},{"key":"9_CR54","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/312624.312649","volume-title":"Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval","author":"T Hofmann","year":"1999","unstructured":"Hofmann T: Probabilistic latent semantic indexing. In Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval. Volume 1. Berkeley, California, USA; 1999:50-57."},{"key":"9_CR55","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1007617005950","volume":"42","author":"T Hofmann","year":"2001","unstructured":"Hofmann T: Unsupervised learning by probabilistic latent semantic analysis. Mach Learn 2001, 42: 177-196. 10.1023\/A:1007617005950","journal-title":"Mach Learn"},{"key":"9_CR56","first-page":"771","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund Y, Schapire R: A short introduction to boosting. J Jpn Soc Artif Intell 1999, 14: 771-780.","journal-title":"J Jpn Soc Artif Intell"},{"key":"9_CR57","volume-title":"C4.5: Programs for Machine Learning","author":"R Quinlan","year":"1993","unstructured":"Quinlan R: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Mateo, CA; 1993."},{"key":"9_CR58","first-page":"115","volume-title":"12th International Conference on Machine Learning","author":"WW Cohen","year":"1995","unstructured":"Cohen WW: Fast effective rule induction. In 12th International Conference on Machine Learning. Volume 1. Tahoe City, California, USA; 1995:115-123."},{"issue":"1","key":"9_CR59","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L: Random forests. Mach Learn 2001,45(1):5-32. 10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"key":"9_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V Vapnik","year":"1995","unstructured":"Vapnik V: The Nature of Statistical Learning Theory. Springer, New York; 1995."},{"key":"9_CR61","first-page":"675","volume-title":"9th European Conference on Principles and Practice of Knowledge Discovery in Databases (Springer LNCS)","author":"M Sumner","year":"2005","unstructured":"Sumner M, Frank E, Gall M: Speeding up logistic model tree induction. In 9th European Conference on Principles and Practice of Knowledge Discovery in Databases (Springer LNCS). Volume 3721. Porto, Portugal; 2005:675-683."},{"key":"9_CR62","first-page":"92","volume-title":"Proceedings of the Workshop on Computation Learning Theory, (ACM)","author":"A Blum","year":"1998","unstructured":"Blum A, Mitchell T: Combining labeled and unlabeled data with co-training. In Proceedings of the Workshop on Computation Learning Theory, (ACM). Volume 1. Madison, Wisconsin, USA; 1998:92-100."},{"key":"9_CR63","first-page":"86","volume-title":"International Conference on Information and Knowledge Management, (ACM)","author":"K Nigam","year":"2000","unstructured":"Nigam K, Ghani R: Analyzing the effectiveness and applicability of co-training. In International Conference on Information and Knowledge Management, (ACM). Volume 1. McLean, Virginia, USA; 2000:86-93."},{"key":"9_CR64","first-page":"1","volume-title":"Proceedings of CASCON, (ACM)","author":"S Kiritchenko","year":"2001","unstructured":"Kiritchenko S, Matwin S: Email classification with co-training. In Proceedings of CASCON, (ACM). Volume 1. Toronto, Ontario, Canada; 2001:1-8."},{"key":"9_CR65","first-page":"586","volume-title":"Proceedings of the International Conference on Web Intelligence","author":"J Chan","year":"2004","unstructured":"Chan J, Koprinska I, Poon J: Co-training with a single natural feature set applied to email classification. In Proceedings of the International Conference on Web Intelligence. Volume 1. Beijing, China; 2004:586-589."},{"key":"9_CR66","first-page":"235","volume-title":"Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP","author":"X Wan","year":"2009","unstructured":"Wan X: Co-training for cross-lingual sentiment classification. In Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP. Volume 1. Suntec, Singapore; 2009:235-243."},{"key":"9_CR67","first-page":"393","volume-title":"Proceedings of the 28th International Conference on Machine Learning, ACM","author":"A Kumar","year":"2011","unstructured":"Kumar A, Daum\u00e9 H III: A co-training approach for multi-view spectral clustering. In Proceedings of the 28th International Conference on Machine Learning, ACM. Volume 1. Bellevue, WA, USA; 2011:393-400."},{"key":"9_CR68","unstructured":"SpamAssassin Publiccorpus[ http:\/\/spamassassin.apache.org\/publiccorpus\/ .]"},{"key":"9_CR69","unstructured":"PhishingCorpus[ http:\/\/monkey.org\/~jose\/wiki\/doku.php ]"},{"key":"9_CR70","unstructured":"Enron Email Dataset[ http:\/\/www.cs.cmu.edu\/~enron\/ ]"},{"key":"9_CR71","unstructured":"SPAM Archive[ http:\/\/untroubled.org\/spam\/ ]"},{"key":"9_CR72","unstructured":"PhishTank[ http:\/\/www.phishtank.com ]"},{"key":"9_CR73","unstructured":"SURBL URI Reputation Data[ http:\/\/www.surbl.org ]"},{"key":"9_CR74","unstructured":"Internet Security Threat Reports[ http:\/\/www.symantec.com\/business\/threatreport\/archive.jsp ]"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-417X-2012-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2012-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-417X-2012-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T13:33:52Z","timestamp":1641562432000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-417X-2012-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,26]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1186\/1687-417x-2012-1","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,26]]},"article-number":"1"}}