{"id":"https://openalex.org/W2950355198","doi":"https://doi.org/10.1145/3325917.3325927","title":"PhAttApp","display_name":"PhAttApp","publication_year":2019,"publication_date":"2019-04-06","ids":{"openalex":"https://openalex.org/W2950355198","doi":"https://doi.org/10.1145/3325917.3325927","mag":"2950355198"},"language":"en","primary_location":{"id":"doi:10.1145/3325917.3325927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3325917.3325927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063077905","display_name":"Thuy Lam","orcid":"https://orcid.org/0000-0003-1118-9614"},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]},{"id":"https://openalex.org/I4210160059","display_name":"Orange County School","ror":"https://ror.org/054pcbf42","country_code":"US","type":"education","lineage":["https://openalex.org/I4210160059"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thuy Lam","raw_affiliation_strings":["The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA and Orange County Water District, Fountain Valley, California, USA"],"affiliations":[{"raw_affiliation_string":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA and Orange County Water District, Fountain Valley, California, USA","institution_ids":["https://openalex.org/I4210160059","https://openalex.org/I125467818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012471223","display_name":"Houssain Kettani","orcid":null},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houssain Kettani","raw_affiliation_strings":["The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"],"affiliations":[{"raw_affiliation_string":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA","institution_ids":["https://openalex.org/I125467818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063077905"],"corresponding_institution_ids":["https://openalex.org/I125467818","https://openalex.org/I4210160059"],"apc_list":null,"apc_paid":null,"fwci":1.4091,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86314143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"154","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9570745229721069},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7679125666618347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7605122327804565},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7309529781341553},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5751304030418396},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.5563230514526367},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.49730637669563293},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47240370512008667},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.44343894720077515},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4319985806941986},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.42130953073501587},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.41661307215690613},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39126214385032654},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14721384644508362},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09492066502571106}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9570745229721069},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7679125666618347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7605122327804565},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7309529781341553},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5751304030418396},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.5563230514526367},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.49730637669563293},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47240370512008667},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.44343894720077515},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4319985806941986},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.42130953073501587},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.41661307215690613},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39126214385032654},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14721384644508362},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09492066502571106},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3325917.3325927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3325917.3325927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W606780114","https://openalex.org/W1136330450","https://openalex.org/W2137760253","https://openalex.org/W2148614760","https://openalex.org/W2184786010","https://openalex.org/W6618528573","https://openalex.org/W6627353189"],"related_works":["https://openalex.org/W3200232030","https://openalex.org/W2914889256","https://openalex.org/W4380789778","https://openalex.org/W4389331041","https://openalex.org/W3211746486","https://openalex.org/W4240330722","https://openalex.org/W4237584680","https://openalex.org/W2784028699","https://openalex.org/W2923881152","https://openalex.org/W4235820881"],"abstract_inverted_index":{"Technology":[0,89],"has":[1],"grown":[2],"rapidly":[3],"since":[4],"the":[5,8,117,176,189,203,228],"end":[6],"of":[7,12,31,33,127,178,205,230],"last":[9],"century.":[10],"Thousands":[11],"businesses":[13,100,140],"from":[14,114],"different":[15],"major":[16],"industries":[17],"are":[18,68],"transforming":[19],"into":[20],"information":[21],"organizations":[22,91,121],"and":[23,29,46,49,104,122,139,172,218,225],"offering":[24],"online":[25,80],"services.":[26],"The":[27],"industrial":[28],"enterprise":[30],"Internet":[32],"Things":[34],"(IoT)":[35],"is":[36,129,188],"growing":[37,131],"at":[38],"an":[39],"exponential":[40],"rate.":[41],"Incident":[42],"Command":[43],"Systems":[44],"(ICS)":[45],"Supervisory":[47],"Control":[48],"Data":[50],"Acquisition":[51],"(SCADA),":[52],"which":[53,153,193],"were":[54,64],"once":[55],"known":[56],"to":[57,83,92,96,119,198,216],"be":[58],"untouchable":[59],"by":[60],"malware":[61],"as":[62,78,168],"they":[63],"usually":[65],"available":[66],"offline,":[67],"now":[69],"facing":[70],"security":[71],"challenges.":[72],"These":[73],"systems":[74],"become":[75],"more":[76],"vulnerable":[77],"their":[79,99],"availability":[81],"increases":[82],"enable":[84],"integration":[85],"with":[86,106,148],"other":[87,107],"systems.":[88],"allows":[90,112],"provide":[93],"greater":[94],"value":[95],"customers,":[97],"expand":[98],"beyond":[101],"physical":[102],"boundaries,":[103],"compete":[105],"businesses.":[108],"However,":[109],"technology":[110],"also":[111],"attackers":[113,154,196],"all":[115],"over":[116],"world":[118],"attack":[120,185],"consumers.":[123],"Ransomware,":[124],"a":[125,130,149,179,206],"type":[126],"malware,":[128],"cybersecurity":[132],"threat.":[133],"It":[134],"mainly":[135],"targets":[136],"home":[137],"users":[138],"for":[141,164],"financial":[142],"gain.":[143],"Ransomware":[144],"attacks":[145],"often":[146,159],"start":[147],"delivery":[150,221],"phase":[151],"in":[152],"deliver":[155],"malicious":[156],"content.":[157],"Attackers":[158],"use":[160,204],"multiple":[161],"threat":[162,191],"vectors":[163],"ransomware":[165,195,220,231],"enablement":[166],"such":[167],"emails,":[169],"instant":[170],"messages,":[171],"drive-by":[173],"downloads,":[174],"exploiting":[175],"vulnerabilities":[177],"network":[180],"or":[181],"application.":[182],"Among":[183],"these":[184],"vectors,":[186],"email":[187],"top":[190],"vector,":[192],"most":[194],"attempt":[197],"use.":[199],"This":[200,211],"study":[201],"proposes":[202],"phishing":[207,223],"detector":[208],"application,":[209],"PhAttApp.":[210],"application":[212],"offers":[213],"numerous":[214],"features":[215],"detect":[217],"prevent":[219],"through":[222],"channels":[224],"thus":[226],"reduces":[227],"risk":[229],"infection.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-07T06:01:17.266235","created_date":"2019-06-27T00:00:00"}
