{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T02:29:46Z","timestamp":1648520986893},"reference-count":15,"publisher":"Scientific Research Publishing, Inc.","issue":"04","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JILSA"],"published-print":{"date-parts":[[2010]]},"DOI":"10.4236\/jilsa.2010.24022","type":"journal-article","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T01:46:19Z","timestamp":1291686379000},"page":"190-199","source":"Crossref","is-referenced-by-count":1,"title":["HumanBoost: Utilization of Users\u2019 Past Trust Decision for Identifying Fraudulent Websites"],"prefix":"10.4236","volume":"02","author":[{"given":"Daisuke","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Hiroaki","family":"Hazeyama","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"2751","reference":[{"key":"ref","doi-asserted-by":"crossref","unstructured":"T. McCall and R. Moss, \u201cGartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Dam-age Consumer Trust in Online Commerce,\u201d 2005. http:\/\/www.gartner.com\/press_releases\/asset_129754 _11. html","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"C. Pettey and H. Stevens, \u201cGartner Says Number of Phishing Attacks on U.S. Consumers In-creased 40 Percent in 2008,\u201d April 2009. http:\/\/www.gartner.com\/it\/ page.jsp?id=936913","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Anti-Phishing Working Group, \u201cPhishing Activity Trends Report-Q1, 2008,\u201d August 2008. http:\/\/www.apwg. com\/reports\/apwgreport_Q1_2008.pdf, 0","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Y. Zhang, S. Egelman, L. Cranor and J. Hong, \u201cPhinding Phish: Evaluating Anti-Phishing Tools,\u201d Proceedings of the 14th Annual Network and Distributed System Security Sympo-sium, USA, February 2007.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"D. Miyamoto, H. Ha-zeyama and Y. Kadobayashi, \u201cAn Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites,\u201d Australian Journal of Intelligent Information Processing Systems, Vol. 10, No. 2, 2008, pp. 54-63.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"I. Fette, N. Sadeh and A. Tomasic, \u201cLearning to Detect Phishing Emails,\u201d Proceedings of the 16th International Conference on World Wide Web, Canada, May 2007, pp. 649-656.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"S. Abu-Nimeh, D. Nappa, X. Wang and S. Nair, \u201cA Comparison of Machine Learning Techniques for Phishing Detection,\u201d Proceedings of the 2nd Annual Anti-Phishing Working Groups eCrime Researchers Summit, USA, October 2007, pp. 60-69.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"R. Basnet, S. Mukkamala and A. H. Sung, \u201cDetection of Phishing Attacks: A Machine Learning Approach,\u201d Studies in Fuzziness and Soft Computing, Vol. 226, February 2008, pp. 373-383.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Y. Pan and X. Ding, \u201cAnomaly Based Web Phishing Page Detection,\u201d Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, USA, September 2006, pp. 381-392.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Y. Zhang, J. Hong and L. Cranor, \u201cCANTINA: A Content-Based Approach to Detect Phishing Web Sites,\u201d Proceedings of the 16th World Wide Web Conference, China, May 2007, pp. 639-648.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Open DNS, \u201cPhishtank-Join the Fight against Phishing,\u201d http:\/\/www.phishtank.com.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"Y. Freund and R. E. Schapire, \u201cA Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting,\u201d Journal of Computer and System Science, Vol. 55, No. 1, August 1997, pp. 119-137.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"R. Dhamija, J. D. Tygar and M.A. Hearst, \u201cWhy Phishing Works,\u201d Proceedings of Conference on Human Factors in Computing Systems, April 2006, pp. 581-590.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"A. Y. Fu, X. Deng, L. Wenyin and G. Little, \u201cThe Methodology and an Application to Fight against Unicode Attacks,\u201d Proceedings of the 2nd Symposium on Usable Privacy and Security, USA, July 2006, pp. 91-101.","DOI":"10.1145\/1143120.1143132"},{"key":"ref","doi-asserted-by":"crossref","unstructured":"T. A. Phelps and R. Wilensky, \u201cRobust Hyperlinks: Cheap, Everywhere, Now,\u201d Proceedings of the 8th International Conference on Digital Documents and Electronic Publishing, September 2000, pp. 28-43.","DOI":"10.1145\/1143120.1143132"}],"container-title":["Journal of Intelligent Learning Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/www.scirp.org\/journal\/PaperDownload.aspx?DOI=10.4236\/jilsa.2010.24022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/jilsa.2010.24022","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/jilsa.2010.24022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T01:25:43Z","timestamp":1499909143000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/jilsa.2010.24022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":15,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2010]]}},"URL":"https:\/\/doi.org\/10.4236\/jilsa.2010.24022","relation":{},"ISSN":["2150-8402","2150-8410"],"issn-type":[{"value":"2150-8402","type":"print"},{"value":"2150-8410","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}