{"id":"https://openalex.org/W2734581193","doi":"https://doi.org/10.1145/1599272.1599279","title":"Online phishing classification using adversarial data mining and signaling games","display_name":"Online phishing classification using adversarial data mining and signaling games","publication_year":2009,"publication_date":"2009-06-28","ids":{"openalex":"https://openalex.org/W2734581193","doi":"https://doi.org/10.1145/1599272.1599279","mag":"2734581193"},"language":"en","primary_location":{"id":"doi:10.1145/1599272.1599279","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1599272.1599279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073636067","display_name":"Gast\u00f3n L\u2019Huillier","orcid":"https://orcid.org/0000-0002-3248-4228"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":true,"raw_author_name":"Gaston L'Huillier","raw_affiliation_strings":["University of Chile, Santiago, Chile"],"affiliations":[{"raw_affiliation_string":"University of Chile, Santiago, Chile","institution_ids":["https://openalex.org/I69737025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085037027","display_name":"Richard W. Weber","orcid":"https://orcid.org/0000-0002-6351-1065"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Richard Weber","raw_affiliation_strings":["University of Chile, Santiago, Chile"],"affiliations":[{"raw_affiliation_string":"University of Chile, Santiago, Chile","institution_ids":["https://openalex.org/I69737025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064367400","display_name":"Nicol\u00e1s Figueroa","orcid":"https://orcid.org/0000-0002-0627-1042"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Nicolas Figueroa","raw_affiliation_strings":["University of Chile, Santiago, Chile"],"affiliations":[{"raw_affiliation_string":"University of Chile, Santiago, Chile","institution_ids":["https://openalex.org/I69737025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073636067"],"corresponding_institution_ids":["https://openalex.org/I69737025"],"apc_list":null,"apc_paid":null,"fwci":6.2228,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.96664171,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8731588125228882},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8044540882110596},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7866809368133545},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.7802794575691223},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6184645295143127},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5726443529129028},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5609905123710632},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5046988725662231},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5017075538635254},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4763115644454956},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42725181579589844},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32276856899261475},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.203635573387146},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13210248947143555}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8731588125228882},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8044540882110596},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7866809368133545},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.7802794575691223},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6184645295143127},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5726443529129028},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5609905123710632},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5046988725662231},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5017075538635254},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4763115644454956},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42725181579589844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32276856899261475},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.203635573387146},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13210248947143555}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1599272.1599279","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1599272.1599279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W50596167","https://openalex.org/W108479605","https://openalex.org/W163939222","https://openalex.org/W236281116","https://openalex.org/W1530756071","https://openalex.org/W1570448133","https://openalex.org/W1604938182","https://openalex.org/W1762008180","https://openalex.org/W1956666414","https://openalex.org/W1972476146","https://openalex.org/W1983557808","https://openalex.org/W2002964284","https://openalex.org/W2009727399","https://openalex.org/W2010608681","https://openalex.org/W2020818097","https://openalex.org/W2040717637","https://openalex.org/W2041597619","https://openalex.org/W2043738837","https://openalex.org/W2047074192","https://openalex.org/W2118024052","https://openalex.org/W2134750673","https://openalex.org/W2139774323","https://openalex.org/W2148614760","https://openalex.org/W2151298633","https://openalex.org/W2153635508","https://openalex.org/W2156909104","https://openalex.org/W2161470437","https://openalex.org/W2162552722","https://openalex.org/W2164641162","https://openalex.org/W2166225451","https://openalex.org/W2264897026","https://openalex.org/W2293768274","https://openalex.org/W2296452361","https://openalex.org/W2336880713","https://openalex.org/W2907748056","https://openalex.org/W2966207845","https://openalex.org/W3120421331","https://openalex.org/W4248083116","https://openalex.org/W4255065712","https://openalex.org/W4303111783","https://openalex.org/W4405364071","https://openalex.org/W6631820450","https://openalex.org/W6640866927"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2040808657","https://openalex.org/W4239582170","https://openalex.org/W3048732067","https://openalex.org/W2918664383","https://openalex.org/W106056076","https://openalex.org/W4320855730","https://openalex.org/W4383468834","https://openalex.org/W2135200719","https://openalex.org/W2900159906"],"abstract_inverted_index":{"In":[0,81,133],"adversarial":[1,21,165],"systems,":[2],"the":[3,14,32,51,112,118,150],"performance":[4],"of":[5,87,117],"a":[6,27,38,62,90,125,136],"classifier":[7,105,152],"decreases":[8],"after":[9],"it":[10],"is":[11,35,96,131,145,153],"deployed,":[12],"as":[13,26,37],"adversary":[15,43,103],"learns":[16],"to":[17,29,78,100],"defeat":[18],"it.":[19],"Recently,":[20],"data":[22,93],"mining":[23,94],"was":[24],"introduced":[25],"solution":[28],"this,":[30],"where":[31,71,170],"classification":[33,161],"problem":[34],"viewed":[36],"game":[39,91,126],"mechanism":[40],"between":[41],"an":[42,45,102,114],"and":[44,47,69,167],"intelligent":[46],"adaptive":[48],"classifier.":[49],"Over":[50],"last":[52],"years,":[53],"phishing":[54,107,143],"fraud":[55,108],"through":[56],"malicious":[57],"email":[58],"messages":[59],"has":[60],"been":[61],"serious":[63],"threat":[64],"that":[65,149],"affects":[66],"global":[67],"security":[68],"economy,":[70],"traditional":[72,173],"spam":[73],"filtering":[74,144],"techniques":[75,176],"have":[76],"shown":[77],"be":[79],"ineffective.":[80],"this":[82,134,164],"domain,":[83],"using":[84,172],"dynamic":[85],"games":[86],"incomplete":[88],"information,":[89],"theoretic":[92,127],"framework":[95],"proposed":[97,151,159],"in":[98,163],"order":[99],"build":[101,111],"aware":[104],"for":[106,142],"detection.":[109],"To":[110],"classifier,":[113],"online":[115,160],"version":[116],"Weighted":[119],"Margin":[120],"Support":[121],"Vector":[122],"Machines":[123],"with":[124,157],"prior":[128],"knowledge":[129],"function":[130],"proposed.":[132],"paper,":[135],"new":[137],"content-based":[138],"feature":[139],"extraction":[140],"technique":[141],"described.":[146],"Experiments":[147],"show":[148],"highly":[154],"competitive":[155],"compared":[156],"previously":[158],"algorithms":[162],"environment,":[166],"promising":[168],"results":[169],"obtained":[171],"machine":[174],"learning":[175],"over":[177],"extracted":[178],"features.":[179]},"counts_by_year":[{"year":2022,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
