{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:26:30Z","timestamp":1761128790992},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/mc.2009.306","type":"journal-article","created":{"date-parts":[[2009,10,7]],"date-time":"2009-10-07T15:57:23Z","timestamp":1254931043000},"page":"78-86","source":"Crossref","is-referenced-by-count":38,"title":["A Comparison of Tools for Detecting Fake Websites"],"prefix":"10.1109","volume":"42","author":[{"given":"Ahmed","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Phinding Phish: Evaluating Anti-Phishing Tools","author":"zhang","year":"2007","journal-title":"Proc 14th Ann Network and Distributed System Security Symp (NDSS 07)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0050-4"},{"key":"ref12","article-title":"NetTrust?Recommendation System for Embedding Trust in a Virtual Realm","author":"hariharan","year":"2007","journal-title":"Proc ACM Conf Recommender Systems (RecSys 07)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"ref14","first-page":"527","article-title":"Focused Crawling Using Context Graphs","author":"diligenti","year":"2000","journal-title":"Proc 26th Conf Very Large Databases (VLDB 2000)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"ref6","article-title":"Client-Side Defense against Web-Based Identity Theft","author":"chou","year":"2004","journal-title":"Proc 11th Ann Network and Distributed System Security Symp (NDSS 04)"},{"key":"ref5","first-page":"55","article-title":"Detecting Fake Escrow Websites Using Rich Fraud Cues and Kernel-Based Methods","author":"abbasi","year":"2007","journal-title":"Proc Workshop on Information Technologies and Systems (WITS 07)"},{"key":"ref8","first-page":"181.1","article-title":"Electronic Commerce Fraud: Towards an Understanding of the Phenomenon","author":"maclnnes","year":"2005","journal-title":"Proc Hawaii Int'l Conf Systems Sciences (HICSS 05)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.23"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.352"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.165"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281250"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/5280637\/05280657.pdf?arnumber=5280657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:31:14Z","timestamp":1638217874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5280657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":14,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/mc.2009.306","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}