{"id":"https://openalex.org/W2566193141","doi":"https://doi.org/10.1109/ccis.2016.7790262","title":"Phishing sites detection based on Url Correlation","display_name":"Phishing sites detection based on Url Correlation","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2566193141","doi":"https://doi.org/10.1109/ccis.2016.7790262","mag":"2566193141"},"language":"en","primary_location":{"id":"doi:10.1109/ccis.2016.7790262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2016.7790262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100583559","display_name":"Ying Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Xue","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China","China Information Technology Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100421852","display_name":"Yang Li","orcid":"https://orcid.org/0009-0007-1601-633X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China","China Information Technology Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100895162","display_name":"Yuangang Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuangang Yao","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102768734","display_name":"Xianghui Zhao","orcid":"https://orcid.org/0000-0002-2417-7391"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianghui Zhao","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071369295","display_name":"Jianyi Liu","orcid":"https://orcid.org/0000-0002-1911-1697"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianyi Liu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100750679","display_name":"Ru Zhang","orcid":"https://orcid.org/0000-0002-4635-7043"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Zhang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100583559"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210160629"],"apc_list":null,"apc_paid":null,"fwci":2.654,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92312952,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"29","issue":null,"first_page":"244","last_page":"248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9225977659225464},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.798852801322937},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6770114302635193},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6575788259506226},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5681582093238831},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.5589181184768677},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5093106031417847},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4598601162433624},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4119420647621155},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3762879967689514},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2557854652404785},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.05590856075286865}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9225977659225464},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.798852801322937},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6770114302635193},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6575788259506226},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5681582093238831},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.5589181184768677},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5093106031417847},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4598601162433624},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4119420647621155},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3762879967689514},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2557854652404785},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.05590856075286865},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccis.2016.7790262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2016.7790262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1582036582","https://openalex.org/W1980558234","https://openalex.org/W2008064532","https://openalex.org/W2053774863","https://openalex.org/W2146729596","https://openalex.org/W2295731716","https://openalex.org/W2354431006","https://openalex.org/W6696870837","https://openalex.org/W6706303920"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121","https://openalex.org/W4388020458"],"abstract_inverted_index":{"With":[0],"the":[1,5,51,56,80,84],"rapid":[2],"development":[3],"of":[4,53,67],"information":[6],"technology,":[7],"internet":[8],"security":[9],"has":[10],"drawn":[11],"more":[12,14],"and":[13,22,37],"attention.":[15],"Nowadays,":[16],"most":[17],"researchers":[18],"focus":[19],"on":[20,50],"lexical":[21],"host":[23],"features":[24],"to":[25],"classify":[26],"Phishing":[27],"URLs.":[28],"In":[29,62],"this":[30],"paper,":[31],"we":[32,60],"proposed":[33],"Vulnerable":[34],"Sites":[35],"List":[36,57],"a":[38,64],"new":[39,77],"feature":[40,78],"which":[41,74,82],"is":[42,48,69],"named":[43],"URL":[44,46],"Correlation.":[45],"Correlation":[47],"based":[49],"similarity":[52],"URLs":[54],"with":[55,79],"above":[58],"that":[59],"created.":[61],"addition,":[63],"large":[65],"improvement":[66],"accuracy":[68],"observed":[70],"by":[71],"comparing":[72],"methods":[73],"use":[75,83],"our":[76],"others":[81],"normal":[85],"one.":[86]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
