{"id":"https://openalex.org/W2055411299","doi":"https://doi.org/10.1145/1947940.1948049","title":"A phishing analysis of web based systems","display_name":"A phishing analysis of web based systems","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2055411299","doi":"https://doi.org/10.1145/1947940.1948049","mag":"2055411299"},"language":"en","primary_location":{"id":"doi:10.1145/1947940.1948049","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038463236","display_name":"Pravin D. Soni","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pravin Soni","raw_affiliation_strings":["Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090324333","display_name":"Shamal M. Firake","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shamal Firake","raw_affiliation_strings":["Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079173060","display_name":"B. B. Meshram","orcid":"https://orcid.org/0000-0002-3580-5824"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. B. Meshram","raw_affiliation_strings":["Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Veermata Jijabai Technological Institute, Mumbai, Maharashtra, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038463236"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.4337,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94598751,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"527","last_page":"527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9830589294433594},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7507719397544861},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.6620340347290039},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.661571741104126},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.6512368321418762},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6453980207443237},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6340785026550293},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5931474566459656},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.5485677123069763},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.5178887844085693},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4638293981552124},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4562869668006897},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4408150315284729},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.26278549432754517},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07292407751083374}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9830589294433594},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7507719397544861},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.6620340347290039},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.661571741104126},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.6512368321418762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6453980207443237},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6340785026550293},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5931474566459656},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.5485677123069763},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.5178887844085693},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4638293981552124},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4562869668006897},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4408150315284729},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26278549432754517},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07292407751083374},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1947940.1948049","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2053774863","https://openalex.org/W2056417289","https://openalex.org/W2080168256","https://openalex.org/W2098081183","https://openalex.org/W2100995598","https://openalex.org/W2116688660","https://openalex.org/W2121587354","https://openalex.org/W2139969188","https://openalex.org/W2144577378","https://openalex.org/W2545733139"],"related_works":["https://openalex.org/W4281884841","https://openalex.org/W2933056782","https://openalex.org/W2012481173","https://openalex.org/W2043034431","https://openalex.org/W83428783","https://openalex.org/W1593211785","https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W1981963489"],"abstract_inverted_index":{"Phishing":[0],"is":[1,24,125,145,163],"form":[2],"of":[3,27,60,105,142,152,177],"identity":[4,64],"theft":[5],"that":[6,75],"uses":[7],"the":[8,58,78,90,100,122,133,140,150,153,164],"social":[9],"engineering":[10],"techniques":[11],"and":[12,35,86,108,128,149,170],"sophisticated":[13],"attack":[14,28],"vectors":[15],"to":[16,39,82,96,102,111,117,137,147,179],"harvest":[17],"financial":[18],"information":[19],"from":[20],"unsuspecting":[21],"consumers.":[22],"It":[23],"a":[25,84,112,175],"kind":[26],"in":[29,54,63,77],"which":[30],"phishers":[31,61],"use":[32],"spoofed":[33],"emails":[34,50],"fraudulent":[36],"web":[37,113,123],"sites":[38],"trick":[40],"people":[41],"into":[42],"giving":[43],"up":[44],"personal":[45],"information.":[46,120],"Victims":[47],"perceive":[48],"these":[49],"as":[51],"trusted,":[52],"while":[53],"reality":[55],"they":[56],"are":[57,156],"work":[59],"interested":[62],"theft.":[65],"Web":[66],"site":[67],"phishing":[68,143,181],"attacks":[69,182],"usually":[70],"start":[71],"with":[72,132],"an":[73],"e-mail":[74],"arrives":[76],"victim's":[79],"mailbox":[80],"pretending":[81],"be":[83,97],"legitimate":[85,127],"known":[87],"entity.":[88],"Usually,":[89],"mail":[91],"claims":[92,136],"some":[93],"urgent":[94,165],"steps":[95],"taken":[98],"by":[99,159],"user":[101,106],"avoid":[103],"blocking":[104],"account":[107],"direct":[109],"him":[110,116],"page":[114,124],"asking":[115],"enter":[118],"private":[119],"But":[121],"not":[126],"has":[129],"no":[130],"association":[131],"organization":[134],"it":[135],"be.":[138],"Hence,":[139],"number":[141,176],"fraud":[144],"continuing":[146],"grow,":[148],"costs":[151],"damages":[154],"caused":[155],"increasing":[157],"day":[158],"day.":[160],"Therefore,":[161],"there":[162],"need":[166],"for":[167],"anti-phishing":[168],"solutions":[169,178],"recently":[171],"have":[172,183],"been":[173,184],"identified,":[174],"mitigate":[180],"proposed.":[185]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
