{"id":"https://openalex.org/W3048326209","doi":"https://doi.org/10.1109/vizsec48167.2019.9161590","title":"PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks","display_name":"PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3048326209","doi":"https://doi.org/10.1109/vizsec48167.2019.9161590","mag":"3048326209"},"language":"en","primary_location":{"id":"doi:10.1109/vizsec48167.2019.9161590","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec48167.2019.9161590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037728366","display_name":"Brett Fouss","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brett Fouss","raw_affiliation_strings":["MIT Lincoln Laboratory"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088643497","display_name":"Dennis Ross","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dennis M. Ross","raw_affiliation_strings":["MIT Lincoln Laboratory"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044815834","display_name":"Allan Wollaber","orcid":"https://orcid.org/0000-0001-5997-9610"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Allan B. Wollaber","raw_affiliation_strings":["MIT Lincoln Laboratory"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046501868","display_name":"Steven R. Gomez","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven R. Gomez","raw_affiliation_strings":["MIT Lincoln Laboratory"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory","institution_ids":["https://openalex.org/I4210122954"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037728366"],"corresponding_institution_ids":["https://openalex.org/I4210122954"],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84764688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9411306381225586},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7869373559951782},{"id":"https://openalex.org/keywords/unicode","display_name":"Unicode","score":0.7768984436988831},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6473554968833923},{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.5976440906524658},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5646042227745056},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5039905905723572},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4614938497543335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44413599371910095},{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.4314735531806946},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3903907537460327},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.3084391951560974},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28997355699539185},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.19196996092796326},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14054590463638306}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9411306381225586},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7869373559951782},{"id":"https://openalex.org/C500551929","wikidata":"https://www.wikidata.org/wiki/Q8819","display_name":"Unicode","level":2,"score":0.7768984436988831},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6473554968833923},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.5976440906524658},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5646042227745056},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5039905905723572},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4614938497543335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44413599371910095},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.4314735531806946},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3903907537460327},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.3084391951560974},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28997355699539185},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19196996092796326},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14054590463638306},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vizsec48167.2019.9161590","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec48167.2019.9161590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W17721411","https://openalex.org/W1631722984","https://openalex.org/W1657640485","https://openalex.org/W1773376987","https://openalex.org/W1914475855","https://openalex.org/W2001516552","https://openalex.org/W2022710553","https://openalex.org/W2083055907","https://openalex.org/W2107174604","https://openalex.org/W2131906261","https://openalex.org/W2161080627","https://openalex.org/W2166606185","https://openalex.org/W2241634675","https://openalex.org/W2271702622","https://openalex.org/W2883994809","https://openalex.org/W2890419535","https://openalex.org/W6637941617"],"related_works":["https://openalex.org/W1953677193","https://openalex.org/W3113362864","https://openalex.org/W2404000518","https://openalex.org/W589182691","https://openalex.org/W1993328117","https://openalex.org/W2358376734","https://openalex.org/W4288900686","https://openalex.org/W3093981686","https://openalex.org/W2062940763","https://openalex.org/W2186032312"],"abstract_inverted_index":{"Attackers":[0],"seeking":[1],"to":[2,17,45,51,56,70,94,143],"deceive":[3],"web":[4],"users":[5,50],"into":[6,152],"visiting":[7],"malicious":[8,91,158],"websites":[9],"can":[10,165],"exploit":[11],"limitations":[12],"of":[13,97,104,109,136,156],"the":[14,67,73,102,161,210],"tools":[15,80],"intended":[16],"help":[18],"browsers":[19],"translate":[20],"domain":[21,28,39,202],"names":[22,29,40],"containing":[23],"non-ASCII":[24,61],"characters,":[25,62],"or":[26],"internationalized":[27],"(IDNs).":[30],"These":[31],"attacks,":[32],"called":[33],"homograph":[34,110,127,189],"phishing,":[35],"involve":[36],"registering":[37],"Unicode":[38],"that":[41,138,214],"are":[42],"visually":[43],"similar":[44],"legitimate":[46],"ones":[47,89],"but":[48],"direct":[49],"distinct":[52],"servers.":[53],"Tools":[54],"exist":[55],"identify":[57],"when":[58],"domains":[59],"use":[60,86,139],"which":[63],"get":[64],"translated":[65],"by":[66],"Punycode":[68,137],"protocol":[69],"work":[71],"with":[72,90,201],"Domain":[74],"Name":[75],"System":[76],"(DNS);":[77],"however,":[78],"these":[79],"cannot":[81],"automatically":[82],"distinguish":[83],"between":[84],"benign":[85],"cases":[87],"and":[88,100,124,170,186,204,209,220,229],"intent,":[92],"leading":[93],"high":[95],"rates":[96],"false-positive":[98],"alerts":[99],"increasing":[101],"workload":[103],"analysts":[105,164,196,217],"looking":[106],"for":[107,122,212,231],"evidence":[108],"phishing.To":[111],"address":[112],"this":[113],"problem,":[114],"we":[115,225],"present":[116],"PunyVis,":[117],"a":[118,153,198],"visual":[119,233],"analytics":[120],"system":[121],"exploring":[123],"identifying":[125],"potential":[126,167],"attacks":[128],"on":[129],"large":[130,150],"network":[131],"datasets.":[132],"By":[133],"targeting":[134],"instances":[135,169],"easily-confusable":[140],"ASCII":[141],"characters":[142],"spoof":[144],"popular":[145],"websites,":[146],"PunyVis":[147,194],"quickly":[148],"condenses":[149],"datasets":[151],"small":[154],"number":[155],"potentially":[157],"records.":[159],"Using":[160],"interactive":[162],"tool,":[163],"evaluate":[166],"phishing":[168],"view":[171],"supporting":[172],"information":[173],"from":[174],"multiple":[175],"data":[176],"sources,":[177],"as":[178,180],"well":[179],"gain":[181],"insight":[182],"about":[183],"overall":[184],"risk":[185],"threat":[187],"regarding":[188],"attacks.":[190],"We":[191],"demonstrate":[192],"how":[193,216],"supports":[195],"in":[197],"case":[199],"study":[200],"experts,":[203],"identified":[205],"divergent":[206],"analysis":[207],"strategies":[208],"need":[211],"interactions":[213],"support":[215],"begin":[218],"exploration":[219],"pivot":[221],"around":[222],"hypotheses.":[223],"Finally,":[224],"discuss":[226],"design":[227],"implications":[228],"opportunities":[230],"cyber":[232],"analytics.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
