{"id":"https://openalex.org/W4407898343","doi":"https://doi.org/10.1007/978-981-96-1907-8_26","title":"Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model","display_name":"Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407898343","doi":"https://doi.org/10.1007/978-981-96-1907-8_26"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-96-1907-8_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-96-1907-8_26","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.vu.nl/en/publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116406069","display_name":"Flavia Lep\u0103datu","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Flavia Lep\u0103datu","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116406070","display_name":"Teodora Mih\u0103ilescu","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Teodora Mih\u0103ilescu","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022524406","display_name":"Suzanne Spaan","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Senne Spaan","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116406071","display_name":"Paula \u0162i\u0163ei","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Paula \u0162i\u0163ei","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116406072","display_name":"Marjolein van der Vossen","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marjolein van der Vossen","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114642227","display_name":"Niek Jan van den Hout","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Niek Jan van den Hout","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114642226","display_name":"Charlotte Hoffmans","orcid":null},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]},{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Charlotte Hoffmans","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","Social AI Group, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]},{"raw_affiliation_string":"Social AI Group, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083304312","display_name":"Jan Treur","orcid":"https://orcid.org/0000-0003-2466-9158"},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]},{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jan Treur","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","Social AI Group, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]},{"raw_affiliation_string":"Social AI Group, Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032203116","display_name":"Peter H. M. P. Roelofsma","orcid":null},"institutions":[{"id":"https://openalex.org/I930713850","display_name":"The Hague University of Applied Sciences","ror":"https://ror.org/021zvq422","country_code":"NL","type":"education","lineage":["https://openalex.org/I930713850"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Peter H. M. P. Roelofsma","raw_affiliation_strings":["Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Risk Management and Cybersecurity Group, Centre of Expertise Cybersecurity, The Hague University of Applied Sciences, The Hague, The Netherlands","institution_ids":["https://openalex.org/I930713850"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5116406069"],"corresponding_institution_ids":["https://openalex.org/I930713850"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08936598,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12488","display_name":"Mental Health via Writing","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8606669902801514},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.553372323513031},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5517610311508179},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33189940452575684},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2257688343524933},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08528685569763184}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8606669902801514},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.553372323513031},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5517610311508179},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33189940452575684},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2257688343524933},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08528685569763184}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-981-96-1907-8_26","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-96-1907-8_26","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lep\u0103datu, F, Mih\u0103ilescu, T, Spaan, S, \u0162i\u0163ei, P, van der Vossen, M, van den Hout, N J, Hoffmans, C, Treur, J & Roelofsma, P H M P 2025, Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model. in D-S Huang, W Chen, C Zhang, Y Pan, Q Zhang & X Kong (eds), Applied Intelligence : Second International Conference, ICAI 2024, Zhengzhou, China, November 22\u201325, 2024, Proceedings, Part I. vol. 1, Communications in Computer and Information Science, no. 1, vol. 2387 CCIS, ICAI: International Conference on Applied Intelligence, vol. 2024, Springer Nature, pp. 270-282, 2nd International Conference on Applied Intelligence, ICAI 2024, Zhenzhou, China, 22/11/24. https://doi.org/10.1007/978-981-96-1907-8_26","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/05be4da1-e2a0-4215-ac40-f2134a4d929c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lep\u0103datu, F, Mih\u0103ilescu, T, Spaan, S, \u0162i\u0163ei, P, van der Vossen, M, van den Hout, N J, Hoffmans, C, Treur, J & Roelofsma, P H M P 2025, Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model. in D-S Huang, W Chen, C Zhang, Y Pan, Q Zhang & X Kong (eds), Applied Intelligence : Second International Conference, ICAI 2024, Zhengzhou, China, November 22\u201325, 2024, Proceedings, Part I. vol. 1, Communications in Computer and Information Science, no. 1, vol. 2387 CCIS, ICAI: International Conference on Applied Intelligence, vol. 2024, Springer Nature, pp. 270-282, 2nd International Conference on Applied Intelligence, ICAI 2024, Zhenzhou, China, 22/11/24. https://doi.org/10.1007/978-981-96-1907-8_26","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/05be4da1-e2a0-4215-ac40-f2134a4d929c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lep\u0103datu, F, Mih\u0103ilescu, T, Spaan, S, \u0162i\u0163ei, P, van der Vossen, M, van den Hout, N J, Hoffmans, C, Treur, J & Roelofsma, P H M P 2025, Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model. in D-S Huang, W Chen, C Zhang, Y Pan, Q Zhang & X Kong (eds), Applied Intelligence : Second International Conference, ICAI 2024, Zhengzhou, China, November 22\u201325, 2024, Proceedings, Part I. vol. 1, Communications in Computer and Information Science, no. 1, vol. 2387 CCIS, ICAI: International Conference on Applied Intelligence, vol. 2024, Springer Nature, pp. 270-282, 2nd International Conference on Applied Intelligence, ICAI 2024, Zhenzhou, China, 22/11/24. https://doi.org/10.1007/978-981-96-1907-8_26","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2136608905","https://openalex.org/W2889064426","https://openalex.org/W2971236623","https://openalex.org/W3133843004","https://openalex.org/W3184834694","https://openalex.org/W4210489023","https://openalex.org/W4220967768","https://openalex.org/W4367549692","https://openalex.org/W4404366285","https://openalex.org/W4406001605"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
