{"id":"https://openalex.org/W4404331245","doi":"https://doi.org/10.1145/3678884.3681864","title":"User-Centered Phishing Detection through Personalized Edge Computing","display_name":"User-Centered Phishing Detection through Personalized Edge Computing","publication_year":2024,"publication_date":"2024-11-11","ids":{"openalex":"https://openalex.org/W4404331245","doi":"https://doi.org/10.1145/3678884.3681864"},"language":"en","primary_location":{"id":"doi:10.1145/3678884.3681864","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678884.3681864","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3678884.3681864","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3678884.3681864","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059400253","display_name":"Sanchari Das","orcid":"https://orcid.org/0000-0003-1299-7867"},"institutions":[{"id":"https://openalex.org/I131651094","display_name":"University of Denver","ror":"https://ror.org/04w7skc03","country_code":"US","type":"education","lineage":["https://openalex.org/I131651094"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanchari Das","raw_affiliation_strings":["Ritchie School of Engineering and Computer Science, University of Denver, Denver, Colorado, USA"],"affiliations":[{"raw_affiliation_string":"Ritchie School of Engineering and Computer Science, University of Denver, Denver, Colorado, USA","institution_ids":["https://openalex.org/I131651094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110700876","display_name":"D Kim","orcid":"https://orcid.org/0000-0002-8863-642X"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"DongInn Kim","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087998492","display_name":"Jacob Abbott","orcid":"https://orcid.org/0000-0002-7173-6643"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacob Abbott","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057479145","display_name":"L. Jean Camp","orcid":"https://orcid.org/0000-0001-8731-7884"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L. Jean Camp","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059400253"],"corresponding_institution_ids":["https://openalex.org/I131651094"],"apc_list":null,"apc_paid":null,"fwci":1.6284,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88353738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"283","last_page":"287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7746881246566772},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7421148419380188},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5217117667198181},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42618072032928467},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4166235029697418},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38569727540016174},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3707754611968994},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3587610125541687},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20443743467330933},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.1677594780921936},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0835980474948883}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7746881246566772},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7421148419380188},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5217117667198181},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42618072032928467},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4166235029697418},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38569727540016174},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3707754611968994},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3587610125541687},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20443743467330933},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.1677594780921936},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0835980474948883}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678884.3681864","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678884.3681864","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3678884.3681864","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3678884.3681864","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3678884.3681864","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3678884.3681864","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4399999976158142,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4404331245.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1968533893","https://openalex.org/W1972642098","https://openalex.org/W2082550336","https://openalex.org/W2125475233","https://openalex.org/W2153987726","https://openalex.org/W2233063544","https://openalex.org/W2562351150","https://openalex.org/W2793551962","https://openalex.org/W3048223477","https://openalex.org/W3081715817","https://openalex.org/W3188846145","https://openalex.org/W3208789061","https://openalex.org/W4206473706","https://openalex.org/W4233819588","https://openalex.org/W4237513721","https://openalex.org/W4366003588","https://openalex.org/W4366590135","https://openalex.org/W4400992956"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W3023564924","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Ensuring":[0],"user-centered":[1],"phishing":[2,92,162],"detection":[3,128],"is":[4],"a":[5,20,51,61,72,81,106,111],"significant":[6],"challenge":[7],"due":[8],"to":[9,38,137,149],"the":[10,30,69,123,132,151],"difficulty":[11],"in":[12,60,156],"distinguishing":[13],"threats.":[14],"To":[15],"address":[16],"this,":[17],"we":[18],"propose":[19],"personalized":[21,73],"tool":[22],"-":[23],"Holistic":[24],"User-Centered":[25],"Identification":[26],"of":[27,71,91,108,125,153],"Threats":[28],"at":[29],"Edge":[31],"(HUCITE).":[32],"Our":[33,54],"system":[34,155],"utilizes":[35],"probabilistic":[36],"logic":[37],"provide":[39],"real-time":[40],"risk":[41,139],"estimates":[42],"for":[43,68,80,110],"local":[44,138],"machines":[45],"and":[46,64,76,89,99,114,135],"employs":[47],"simple":[48],"cartoons":[49],"as":[50],"user":[52,65,113],"interface.":[53],"approach":[55,86,121,136],"focuses":[56],"on":[57,142],"identifying":[58,115],"anomalies":[59],"single":[62],"machine":[63],"browsing":[66],"history":[67],"generation":[70],"green":[74],"list":[75],"global":[77],"threat":[78],"information":[79],"shared":[82],"red":[83],"list.":[84],"This":[85],"enables":[87],"blocking":[88],"identification":[90],"websites,":[93],"potentially":[94],"malicious":[95],"scripts,":[96],"unfamiliar":[97],"domains,":[98],"previously":[100],"unencountered":[101],"certificate":[102],"authorities.":[103],"By":[104],"creating":[105],"zone":[107],"safety":[109],"specific":[112],"departures":[116],"from":[117],"that":[118],"zone,":[119],"our":[120,154],"addresses":[122],"limitations":[124],"traditional":[126],"anomaly":[127],"techniques.":[129],"We":[130],"present":[131],"underlying":[133],"architecture":[134],"identification,":[140],"reporting":[141],"an":[143],"in-lab":[144],"experiment":[145],"involving":[146],"45":[147],"participants":[148],"test":[150],"effectiveness":[152],"various":[157],"stress":[158],"conditions":[159],"affecting":[160],"users'":[161],"perception.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
