{"id":"https://openalex.org/W4237360863","doi":"https://doi.org/10.1145/1299015","title":"Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit","display_name":"Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit","publication_year":2007,"publication_date":"2007-10-04","ids":{"openalex":"https://openalex.org/W4237360863","doi":"https://doi.org/10.1145/1299015"},"language":"en","primary_location":{"id":"doi:10.1145/1299015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1299015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9721999764442444,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/summit","display_name":"Summit","score":0.8949521780014038},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6066737174987793},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5147252082824707},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48905929923057556},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.4745025336742401},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4441376328468323},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4208241105079651},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3638225793838501},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.36361953616142273},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.34421050548553467},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.32132333517074585},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.24240714311599731},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.23937296867370605},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17498242855072021}],"concepts":[{"id":"https://openalex.org/C2778848561","wikidata":"https://www.wikidata.org/wiki/Q207326","display_name":"Summit","level":2,"score":0.8949521780014038},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6066737174987793},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5147252082824707},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48905929923057556},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.4745025336742401},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4441376328468323},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4208241105079651},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3638225793838501},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.36361953616142273},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.34421050548553467},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.32132333517074585},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.24240714311599731},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.23937296867370605},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17498242855072021},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C100970517","wikidata":"https://www.wikidata.org/wiki/Q52107","display_name":"Physical geography","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1299015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1299015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4241376597","https://openalex.org/W1982074779","https://openalex.org/W3203904831","https://openalex.org/W630050097","https://openalex.org/W4246070377","https://openalex.org/W2280577319","https://openalex.org/W2352077919","https://openalex.org/W4246682738","https://openalex.org/W1538842854","https://openalex.org/W2905384139"],"abstract_inverted_index":{"The":[0,144,159,206],"Anti-Phishing":[1],"Working":[2],"Group":[3],"(APWG)":[4],"formed":[5,26],"in":[6,78,104,185,203],"Fall":[7],"2003,":[8],"and":[9,30,92,107,140,173,177,188,195,223],"organized":[10,74],"members-only":[11],"meetings":[12],"to":[13,40,64,226],"advance":[14],"their":[15],"members'":[16],"understanding":[17],"of":[18,43,46,96,120,155,162,165,215],"the":[19,28,41,59,75,84,93,118,121,125,153,181,186,210,213,228],"emerging":[20],"electronic":[21,131],"crime":[22,132],"plexus":[23],"that":[24],"had":[25],"on":[27,117,152,192,218],"Internet":[29],"was":[31,147],"menacing":[32],"society's":[33],"shared":[34],"ecommerce":[35],"infrastructure.":[36],"In":[37],"2006,":[38],"responding":[39],"submission":[42],"overwhelming":[44],"numbers":[45],"high-quality":[47],"papers":[48],"from":[49,137,175],"academic":[50,123,166],"research":[51,102,133,167,178],"institutions,":[52],"APWG":[53,73,126],"Secretary":[54],"General":[55],"Peter":[56],"Cassidy":[57],"founded":[58],"eCrime":[60],"Researchers":[61],"Summit":[62],"(eCRS)":[63],"provide":[65],"an":[66],"appropriate":[67],"venue":[68],"for":[69,87],"this":[70],"vital":[71],"work.":[72],"inaugural":[76],"eCRS":[77,145],"Orlando":[79],"with":[80,135,171],"Florida":[81,94],"State":[82],"University,":[83],"National":[85],"Center":[86],"Forensic":[88],"Science":[89],"at":[90,99],"UCF":[91],"Department":[95],"Law":[97],"Enforcement,":[98],"which":[100],"new":[101],"results":[103],"online":[105,193],"fraud":[106],"countermeasures":[108],"were":[109],"presented":[110],"by":[111,197,220],"leading":[112],"security":[113,196],"researchers.":[114],"To":[115],"build":[116],"success":[119],"2006":[122],"meeting,":[124],"soon":[127],"scheduled":[128],"a":[129,163,189,200],"second":[130],"conference":[134],"faculty":[136],"Indiana":[138],"University":[139],"Carnegie":[141,156],"Mellon":[142,157],"University.":[143,158],"2007":[146],"held":[148],"October":[149],"4--5,":[150],"2007,":[151],"campus":[154],"program":[160,207],"consisted":[161],"balance":[164],"papers;":[168],"three":[169],"panels":[170],"moderators":[172],"panelists":[174],"industry":[176],"institutions":[179],"discussing":[180],"most":[182],"recent":[183],"developments":[184],"area;":[187],"keynote":[190],"talk":[191],"gaming":[194],"Gary":[198],"McGraw,":[199],"noted":[201],"specialist":[202],"applied":[204],"security.":[205],"committee":[208],"selected":[209],"paper":[211,230],"\"Examining":[212],"Impact":[214],"Website":[216],"Take-down":[217],"Phishing\"":[219],"Tyler":[221],"Moore":[222],"Richard":[224],"Clayton":[225],"receive":[227],"best":[229],"award.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
