{"id":"https://openalex.org/W1536617361","doi":"https://doi.org/10.1108/ics-02-2013-0009","title":"Examining the effectiveness of phishing filters against DNS based phishing attacks","display_name":"Examining the effectiveness of phishing filters against DNS based phishing attacks","publication_year":2015,"publication_date":"2015-06-10","ids":{"openalex":"https://openalex.org/W1536617361","doi":"https://doi.org/10.1108/ics-02-2013-0009","mag":"1536617361"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2013-0009","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2013-0009","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045291066","display_name":"Swapan Purkait","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Swapan Purkait","raw_affiliation_strings":["Nettech Private Limited,Kolkata,India","(Nettech Private Limited, Kolkata, India)"],"affiliations":[{"raw_affiliation_string":"Nettech Private Limited,Kolkata,India","institution_ids":[]},{"raw_affiliation_string":"(Nettech Private Limited, Kolkata, India)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045291066"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.2936,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.92662249,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"23","issue":"3","first_page":"333","last_page":"346"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9749913811683655},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6233775615692139},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5900192856788635},{"id":"https://openalex.org/keywords/hypertext-transfer-protocol","display_name":"Hypertext Transfer Protocol","score":0.5496387481689453},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5166728496551514},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48334285616874695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4810121953487396},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.46406373381614685},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45228785276412964},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34072810411453247},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.11973452568054199}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9749913811683655},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6233775615692139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5900192856788635},{"id":"https://openalex.org/C149672775","wikidata":"https://www.wikidata.org/wiki/Q8777","display_name":"Hypertext Transfer Protocol","level":3,"score":0.5496387481689453},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5166728496551514},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48334285616874695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4810121953487396},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.46406373381614685},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45228785276412964},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34072810411453247},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.11973452568054199},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2013-0009","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2013-0009","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W121592505","https://openalex.org/W192036632","https://openalex.org/W215137156","https://openalex.org/W1498527206","https://openalex.org/W1550557446","https://openalex.org/W1970033617","https://openalex.org/W1974075050","https://openalex.org/W1985747251","https://openalex.org/W1988068423","https://openalex.org/W2003219686","https://openalex.org/W2022334732","https://openalex.org/W2026843999","https://openalex.org/W2030744792","https://openalex.org/W2043042131","https://openalex.org/W2071695218","https://openalex.org/W2083065821","https://openalex.org/W2084622065","https://openalex.org/W2088805625","https://openalex.org/W2099553482","https://openalex.org/W2104923322","https://openalex.org/W2110952687","https://openalex.org/W2131906261","https://openalex.org/W2150326939","https://openalex.org/W2157681268","https://openalex.org/W2160343382","https://openalex.org/W2161343004","https://openalex.org/W2166660605","https://openalex.org/W2243573089","https://openalex.org/W2287013604","https://openalex.org/W2487002603","https://openalex.org/W2540891029","https://openalex.org/W3147169121","https://openalex.org/W4213362721","https://openalex.org/W4229799504","https://openalex.org/W6684721935"],"related_works":["https://openalex.org/W3127778980","https://openalex.org/W4387799680","https://openalex.org/W4308237908","https://openalex.org/W2784207743","https://openalex.org/W2287013604","https://openalex.org/W1536617361","https://openalex.org/W2802870851","https://openalex.org/W4378805743","https://openalex.org/W3024119512","https://openalex.org/W1523234773"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,52,102,135],"This":[2,136],"paper":[3],"aims":[4],"to":[5,41,81,187],"report":[6],"on":[7,48,99],"research":[8],"that":[9,164,175,182],"tests":[10],"the":[11,43,49,59,109,121,139,192,210],"effectiveness":[12,60],"of":[13,46,61,78,120,141,149,173,190],"anti-phishing":[14,159],"tools":[15,89,123],"in":[16,76,177],"detecting":[17],"phishing":[18,28,47,68,96,114],"attacks":[19],"by":[20],"conducting":[21],"some":[22],"real-time":[23],"experiments":[24,104],"using":[25],"freshly":[26],"hosted":[27,84,98,132],"sites.":[29],"Almost":[30],"all":[31,157],"modern-day":[32],"Web":[33,64,166,206],"browsers":[34],"and":[35,57,71,147],"antivirus":[36,74],"programs":[37,75],"provide":[38],"security":[39],"indicators":[40],"mitigate":[42],"widespread":[44],"problem":[45],"Internet.":[50,100],"Design/methodology/approach":[51],"The":[53,87,103],"current":[54],"work":[55,137],"examines":[56],"evaluates":[58],"five":[62],"popular":[63,73],"browsers,":[65],"two":[66],"third-party":[67],"toolbar":[69],"add-ons":[70],"seven":[72],"terms":[77],"their":[79],"capability":[80],"detect":[82,127],"locally":[83],"spoofed":[85,130],"websites.":[86],"same":[88],"have":[90],"also":[91,162],"been":[92],"tested":[93,124],"against":[94,112],"fresh":[95],"sites":[97,115],"Findings":[101],"yielded":[105],"alarming":[106],"results.":[107],"Although":[108],"success":[110],"rate":[111],"live":[113],"was":[116],"encouraging,":[117],"only":[118],"3":[119],"14":[122],"could":[125],"successfully":[126],"a":[128,153,165,170,184,205],"single":[129],"website":[131,155],"locally.":[133],"Originality/value":[134],"proposes":[138,163],"inclusion":[140],"domain":[142],"name":[143,150],"system":[144],"server":[145],"authentication":[146],"verification":[148],"servers":[151],"for":[152,156],"visiting":[154],"future":[158],"toolbars.":[160],"It":[161],"browser":[167,207],"should":[168,195,208],"maintain":[169],"white":[171],"list":[172],"websites":[174],"engage":[176],"online":[178],"monetary":[179],"transactions":[180],"so":[181],"when":[183],"user":[185],"requires":[186],"access":[188],"any":[189],"these,":[191],"default":[193],"protocol":[194],"always":[196],"be":[197],"HTTPS":[198],"(Hypertext":[199],"Transfer":[200],"Protocol":[201],"Secure),":[202],"without":[203],"which":[204],"prevent":[209],"page":[211],"from":[212],"loading.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
