{"id":"https://openalex.org/W3005827455","doi":"https://doi.org/10.4018/jitr.2020040106","title":"Phishing Attack Detection using a Search Engine and Heuristics-based Technique","display_name":"Phishing Attack Detection using a Search Engine and Heuristics-based Technique","publication_year":2020,"publication_date":"2020-02-14","ids":{"openalex":"https://openalex.org/W3005827455","doi":"https://doi.org/10.4018/jitr.2020040106","mag":"3005827455"},"language":"en","primary_location":{"id":"doi:10.4018/jitr.2020040106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jitr.2020040106","pdf_url":null,"source":{"id":"https://openalex.org/S138592535","display_name":"Journal of Information Technology Research","issn_l":"1938-7857","issn":["1938-7857","1938-7865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Technology Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":["National Institute of Technology, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017781286","display_name":"Ankit Kumar Jain","orcid":"https://orcid.org/0000-0002-9482-6991"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankit Kumar Jain","raw_affiliation_strings":["National Institute of Technology, India"],"raw_orcid":"https://orcid.org/0000-0002-9482-6991","affiliations":[{"raw_affiliation_string":"National Institute of Technology, India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071261948"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":null,"apc_paid":null,"fwci":4.7321,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.95344726,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"13","issue":"2","first_page":"94","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.813145637512207},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.788887619972229},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.7795849442481995},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.7577824592590332},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.6486860513687134},{"id":"https://openalex.org/keywords/spamdexing","display_name":"Spamdexing","score":0.6276445388793945},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.6168152093887329},{"id":"https://openalex.org/keywords/principle-of-legality","display_name":"Principle of legality","score":0.45120230317115784},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40347322821617126},{"id":"https://openalex.org/keywords/search-analytics","display_name":"Search analytics","score":0.36078503727912903},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2878688871860504},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.28680184483528137},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2341618537902832},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07075467705726624}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.813145637512207},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.788887619972229},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.7795849442481995},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.7577824592590332},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.6486860513687134},{"id":"https://openalex.org/C13565553","wikidata":"https://www.wikidata.org/wiki/Q804206","display_name":"Spamdexing","level":5,"score":0.6276445388793945},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.6168152093887329},{"id":"https://openalex.org/C42027317","wikidata":"https://www.wikidata.org/wiki/Q2307054","display_name":"Principle of legality","level":2,"score":0.45120230317115784},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40347322821617126},{"id":"https://openalex.org/C14838553","wikidata":"https://www.wikidata.org/wiki/Q7441639","display_name":"Search analytics","level":4,"score":0.36078503727912903},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2878688871860504},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.28680184483528137},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2341618537902832},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07075467705726624},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/jitr.2020040106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jitr.2020040106","pdf_url":null,"source":{"id":"https://openalex.org/S138592535","display_name":"Journal of Information Technology Research","issn_l":"1938-7857","issn":["1938-7857","1938-7865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Technology Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1147066959","https://openalex.org/W1482565952","https://openalex.org/W1536617361","https://openalex.org/W1964088283","https://openalex.org/W1973249990","https://openalex.org/W1983363310","https://openalex.org/W1990188874","https://openalex.org/W2041245725","https://openalex.org/W2041702849","https://openalex.org/W2093961810","https://openalex.org/W2139565456","https://openalex.org/W2154586245","https://openalex.org/W2160353917","https://openalex.org/W2190160046","https://openalex.org/W2278316643","https://openalex.org/W2310347995","https://openalex.org/W2418966180","https://openalex.org/W2517538529","https://openalex.org/W2606751384","https://openalex.org/W2614646077","https://openalex.org/W2616668266","https://openalex.org/W2768094440","https://openalex.org/W2800391419","https://openalex.org/W3124501556","https://openalex.org/W6684212199"],"related_works":["https://openalex.org/W2062919806","https://openalex.org/W4372346753","https://openalex.org/W2922524414","https://openalex.org/W4322393913","https://openalex.org/W2222022498","https://openalex.org/W2964491004","https://openalex.org/W2223855511","https://openalex.org/W2419328283","https://openalex.org/W2561589622","https://openalex.org/W2351412568"],"abstract_inverted_index":{"The":[0,61,112],"language":[1,35,56,71],"used":[2,57],"in":[3,13,32,44,108],"the":[4,8,11,16,22,28,33,54,59,77,80,90,96,109,119,140],"textual":[5,55],"content":[6],"of":[7,15,21,53,79,148],"webpage":[9],"is":[10],"barrier":[12],"most":[14],"existing":[17,23],"anti-phishing":[18,24],"methods.":[19,132],"Most":[20],"methods":[25],"can":[26,115],"identify":[27],"fake":[29],"webpages":[30,50],"written":[31],"English":[34],"only.":[36],"Therefore,":[37],"we":[38],"present":[39],"a":[40,67],"search":[41,63,73,91,110,130],"engine-based":[42,64,92,131],"method":[43,65,114,138],"this":[45],"article,":[46],"which":[47],"identifies":[48],"phishing":[49],"accurately":[51],"regardless":[52],"within":[58],"webpage.":[60],"proposed":[62,113],"uses":[66],"lightweight,":[68],"consistent":[69],"and":[70,144,149],"independent":[72],"query":[74],"to":[75,94],"detect":[76],"legality":[78],"suspicious":[81],"URL.":[82],"We":[83],"have":[84],"also":[85,116],"integrated":[86],"five":[87],"heuristics":[88],"with":[89],"mechanism":[93],"improve":[95],"detection":[97],"accuracy,":[98],"as":[99],"some":[100],"newly":[101,120],"created":[102,121],"legitimate":[103,122],"sites":[104,123],"may":[105],"not":[106,126],"appear":[107],"engine.":[111],"correctly":[117],"classify":[118],"that":[124,136],"are":[125],"classified":[127],"by":[128],"available":[129,141],"Evaluation":[133],"results":[134],"show":[135],"our":[137],"outperforms":[139],"search-based":[142],"techniques":[143],"achieves":[145],"98.15%":[146],"TPR":[147],"only":[150],"0.05%":[151],"FPR.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
