{"id":"https://openalex.org/W2598727995","doi":"https://doi.org/10.1145/3041008.3041016","title":"What's in a URL","display_name":"What's in a URL","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W2598727995","doi":"https://doi.org/10.1145/3041008.3041016","mag":"2598727995"},"language":"en","primary_location":{"id":"doi:10.1145/3041008.3041016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050592031","display_name":"Rakesh Verma","orcid":"https://orcid.org/0000-0002-7466-7823"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rakesh Verma","raw_affiliation_strings":["University of Houston, Houston, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065790431","display_name":"Avisha Das","orcid":"https://orcid.org/0000-0002-5015-2665"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avisha Das","raw_affiliation_strings":["University of Houston, Houston, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050592031"],"corresponding_institution_ids":["https://openalex.org/I44461941"],"apc_list":null,"apc_paid":null,"fwci":13.1622,"has_fulltext":false,"cited_by_count":87,"citation_normalized_percentile":{"value":0.98606508,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9417945146560669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.717735230922699},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6062389612197876},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5939906239509583},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5756998062133789},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5751616358757019},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5725439786911011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5544419288635254},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5216836929321289},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.49644118547439575},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4766319990158081},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4680948555469513},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.44361597299575806},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3410799205303192},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.32676637172698975}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9417945146560669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.717735230922699},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6062389612197876},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5939906239509583},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5756998062133789},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5751616358757019},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5725439786911011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5544419288635254},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5216836929321289},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.49644118547439575},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4766319990158081},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4680948555469513},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44361597299575806},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3410799205303192},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.32676637172698975},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3041008.3041016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3188536113","display_name":null,"funder_award_id":"DUE 1241772 CNS 1319212 DGE 1433817","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309549","display_name":"University of Houston","ror":"https://ror.org/040vwpm13"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W24863754","https://openalex.org/W83428783","https://openalex.org/W150462035","https://openalex.org/W184264206","https://openalex.org/W1565725288","https://openalex.org/W1568881000","https://openalex.org/W1966771059","https://openalex.org/W1975909792","https://openalex.org/W1989957782","https://openalex.org/W2012481173","https://openalex.org/W2023973750","https://openalex.org/W2029591949","https://openalex.org/W2042553823","https://openalex.org/W2102486516","https://openalex.org/W2118075434","https://openalex.org/W2121990650","https://openalex.org/W2122537498","https://openalex.org/W2133990480","https://openalex.org/W2139565456","https://openalex.org/W2152929147","https://openalex.org/W2160218441","https://openalex.org/W2163764145","https://openalex.org/W2531223178","https://openalex.org/W2545557236"],"related_works":["https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W1981963489","https://openalex.org/W2121587354","https://openalex.org/W4250020282","https://openalex.org/W2080177354","https://openalex.org/W2139969188","https://openalex.org/W2187127088","https://openalex.org/W2148614760"],"abstract_inverted_index":{"Phishing":[0],"is":[1,76,98],"an":[2,26,34],"online":[3],"social":[4],"engineering":[5],"attack":[6,27],"with":[7],"the":[8,31,56,82,85,90,107],"goal":[9],"of":[10,33],"digital":[11],"identity":[12],"theft":[13],"carried":[14],"out":[15],"by":[16],"pretending":[17],"to":[18,46,51,69,78],"be":[19],"a":[20,43,47,62],"legitimate":[21],"entity.":[22],"The":[23],"attacker":[24,83],"sends":[25],"vector":[28],"commonly":[29],"in":[30,114],"form":[32],"email,":[35],"chat":[36],"session,":[37],"blog":[38],"post":[39],"etc.,":[40],"which":[41],"contains":[42],"link":[44],"(URL)":[45],"malicious":[48],"website":[49,91,109],"hosted":[50],"elicit":[52],"private":[53],"information":[54],"from":[55,95,106],"victims.":[57],"We":[58],"focus":[59],"on":[60],"building":[61],"system":[63],"for":[64],"URL":[65,74],"analysis":[66,75],"and":[67,84,92,110],"classification":[68],"primarily":[70],"detect":[71],"phishing":[72],"attacks.":[73],"attractive":[77],"maintain":[79],"distance":[80],"between":[81],"victim,":[86],"rather":[87],"than":[88,101],"visiting":[89],"getting":[93],"features":[94,112],"it.":[96],"It":[97],"also":[99],"faster":[100],"Internet":[102],"search,":[103],"retrieving":[104],"content":[105],"destination":[108],"network-level":[111],"used":[113],"previous":[115],"research.":[116]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2017-04-07T00:00:00"}
