{"id":"https://openalex.org/W2010386143","doi":"https://doi.org/10.1109/isbast.2014.7013124","title":"Survey of anti-phishing tools with detection capabilities","display_name":"Survey of anti-phishing tools with detection capabilities","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2010386143","doi":"https://doi.org/10.1109/isbast.2014.7013124","mag":"2010386143"},"language":"en","primary_location":{"id":"doi:10.1109/isbast.2014.7013124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isbast.2014.7013124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027394779","display_name":"Hiba Zuhair Zeydan","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Hiba Zuhair Zeydan","raw_affiliation_strings":["Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089742876","display_name":"Ali Selamat","orcid":"https://orcid.org/0000-0001-9746-8459"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ali Selamat","raw_affiliation_strings":["Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033426232","display_name":"Mazleena Salleh","orcid":"https://orcid.org/0000-0003-4741-8255"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mazleena Salleh","raw_affiliation_strings":["Universiti Teknologi Malaysia, Skudai, Johor, MY","Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Teknologi Malaysia, Skudai, Johor, MY","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027394779"],"corresponding_institution_ids":["https://openalex.org/I4576418"],"apc_list":null,"apc_paid":null,"fwci":3.9445,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93784092,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":null,"first_page":"214","last_page":"219"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.973724365234375},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9207848310470581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6516700983047485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5819268822669983},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5056452751159668},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4677714705467224},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3855476975440979},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3481389880180359},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27979007363319397},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2309836447238922}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.973724365234375},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9207848310470581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6516700983047485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5819268822669983},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5056452751159668},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4677714705467224},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3855476975440979},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3481389880180359},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27979007363319397},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2309836447238922}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isbast.2014.7013124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isbast.2014.7013124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323300","display_name":"Universiti Teknologi Malaysia","ror":"https://ror.org/026w31v75"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W178965085","https://openalex.org/W602999593","https://openalex.org/W1801051130","https://openalex.org/W1971257159","https://openalex.org/W1973249990","https://openalex.org/W1974075050","https://openalex.org/W1975595752","https://openalex.org/W1977776704","https://openalex.org/W1985920648","https://openalex.org/W1989320954","https://openalex.org/W1990188874","https://openalex.org/W1993155576","https://openalex.org/W1993851562","https://openalex.org/W2028223155","https://openalex.org/W2033728501","https://openalex.org/W2055411299","https://openalex.org/W2070243518","https://openalex.org/W2074452038","https://openalex.org/W2077290518","https://openalex.org/W2091024724","https://openalex.org/W2113449956","https://openalex.org/W2132292916","https://openalex.org/W2139565456","https://openalex.org/W2139969188","https://openalex.org/W2160353917","https://openalex.org/W2161983758","https://openalex.org/W2164600404","https://openalex.org/W2165267130","https://openalex.org/W2169046838","https://openalex.org/W2183891152","https://openalex.org/W2186176844","https://openalex.org/W2295731716","https://openalex.org/W2296053495","https://openalex.org/W2339483600","https://openalex.org/W2545733139","https://openalex.org/W2555971301","https://openalex.org/W2603747259","https://openalex.org/W3120385143","https://openalex.org/W4285719527","https://openalex.org/W6638489259","https://openalex.org/W6684212199","https://openalex.org/W6686325558","https://openalex.org/W6686959447","https://openalex.org/W6697146388","https://openalex.org/W6703898999","https://openalex.org/W6730223775"],"related_works":["https://openalex.org/W2790026742","https://openalex.org/W2185625238","https://openalex.org/W2906698902","https://openalex.org/W3172100151","https://openalex.org/W4378570479","https://openalex.org/W2613718967","https://openalex.org/W657290097","https://openalex.org/W2088583206","https://openalex.org/W118448456","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Phishers":[0],"have":[1],"been":[2],"continually":[3],"changed":[4],"their":[5,51],"tricks":[6],"and":[7,15,60,79,97],"emerged":[8],"novel":[9,41,58],"variants":[10],"for":[11],"more":[12],"security":[13,100],"violations":[14],"causes":[16],"of":[17,25,36,57,72,88],"monetary":[18],"losses":[19],"in":[20],"business":[21],"organizations.":[22],"The":[23],"lack":[24],"existing":[26,47],"anti-phishing":[27,33,48],"solutions":[28],"considered":[29],"as":[30],"an":[31],"optimum":[32],"is":[34],"because":[35],"detection":[37,52],"incapability":[38,53],"specifically":[39],"against":[40,54],"phishes.":[42],"This":[43],"paper":[44,83],"classifies":[45],"the":[46,62,92,99],"tools,":[49],"identifies":[50],"several":[55],"kinds":[56],"phishes":[59],"underscores":[61],"issues":[63],"behind":[64],"this":[65,82],"problem.":[66],"Further":[67],"it":[68],"suggests":[69],"next":[70],"wave":[71],"research":[73],"to":[74,90],"solve":[75],"it.":[76],"Targeting":[77],"academic":[78],"industry":[80],"researchers,":[81],"provide":[84],"a":[85],"valuable":[86],"source":[87],"information":[89],"contribute":[91],"cyberspace":[93],"with":[94],"new":[95],"products":[96],"fulfill":[98],"flaws.":[101]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
