{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:27Z","timestamp":1740099207549,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_52","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T11:21:11Z","timestamp":1537874471000},"page":"586-599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter"],"prefix":"10.1007","author":[{"given":"Bingnan","family":"Hou","sequence":"first","affiliation":[]},{"given":"Jiaping","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Bixin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"52_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-54792-8_9","volume-title":"Principles of Security and Trust","author":"A Bichhawat","year":"2014","unstructured":"Bichhawat, A., Rajani, V., Garg, D., Hammer, C.: Information flow control in WebKit\u2019s JavaScript bytecode. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 159\u2013178. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54792-8_9"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Shindo, Y., et al.: Lightweight approach to detect drive-by download attacks based on file type transition. ACM (2014)","DOI":"10.1145\/2680821.2680826"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Jensen, S.H., Madsen, M., Moller, A.: Modeling the HTML DOM and browser API in static analysis of JavaScript web applications. ACM (2011)","DOI":"10.1145\/2025113.2025125"},{"key":"52_CR4","unstructured":"Thinh, T.N., et al.: Memory-efficient signature matching for ClamAV on FPGA (2014)"},{"key":"52_CR5","unstructured":"Flores, R.: How Blackhat SEO became big. Technical report, Trend Micro (2010)"},{"issue":"2","key":"52_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"1","author":"L Spitzner","year":"2003","unstructured":"Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 1(2), 15\u201323 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"52_CR7","first-page":"12","volume":"2","author":"Z Gang","year":"2014","unstructured":"Gang, Z., Peng, W., Xin, W.: The detection method for two-dimensional barcode malicious URL based on the decision tree. Inf. Secur. Technol. 2, 12 (2014)","journal-title":"Inf. Secur. Technol."},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Choi, J., et al.: Efficient malicious code detection using n-gram analysis and SVM. IEEE (2011)","DOI":"10.1109\/NBiS.2011.104"},{"key":"52_CR9","unstructured":"Wang, Y., et al.: Automated web patrol with strider honeymonkeys (2006)"},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Kaur, R., Singh, M.: Efficient hybrid technique for detecting zero-day polymorphic worms. IEEE (2014)","DOI":"10.1109\/IAdCC.2014.6779301"},{"key":"52_CR11","unstructured":"Moshchuk, A., et al.: A crawler-based study of spyware in the web (2006)"},{"key":"52_CR12","unstructured":"Seifert, C., Steenson, R.: Capture-honeypot client (capture-HPC) (2006)"},{"key":"52_CR13","unstructured":"Nazario, J.: PhoneyC: a virtual client honeypot. USENIX Association (2009)"},{"key":"52_CR14","unstructured":"Keane, J.K.: Using the Google safe browsing API from PHP. Mad Irish, 7 August 2009"},{"issue":"1","key":"52_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"52_CR16","unstructured":"Seifert, C., Welch, I., Komisarczuk, P.: Honeyc-the low-interaction client honeypot. In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton (2007)"},{"key":"52_CR17","unstructured":"Friedrichs, O., Huger, A., O\u2019Donnell, A.J.: Method and apparatus for detecting malicious software using machine learning techniques. US Patent (2015)"},{"key":"52_CR18","unstructured":"Feinstein, B., Peck, D., Secureworks, Inc.: Caffeine monkey: automated collection, detection and analysis of malicious JavaScript. Black Hat USA (2007)"},{"key":"52_CR19","doi-asserted-by":"crossref","unstructured":"Rieck, K., Krueger, T., Dewald, A.: Cujo: efficient detection and prevention of drive-by-download attacks. ACM (2010)","DOI":"10.1145\/1920261.1920267"},{"key":"52_CR20","unstructured":"Curtsinger, C., et al.: ZOZZLE: fast and precise in-browser JavaScript malware detection (2011)"},{"key":"52_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-10509-8_19","volume-title":"Future Generation Information Technology","author":"YH Choi","year":"2009","unstructured":"Choi, Y.H., Kim, T.G., Choi, S.J., Lee, C.W.: Automatic detection for JavaScript obfuscation attacks in web pages through string pattern analysis. In: Lee, Y., Kim, T., Fang, W., \u015al\u0119zak, D. (eds.) FGIT 2009. LNCS, vol. 5899, pp. 160\u2013172. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10509-8_19"},{"key":"52_CR22","unstructured":"Long, J.: Google Hacking for Penetration Testers. Syngress (2011)"},{"key":"52_CR23","unstructured":"Pilgrim, M.: Dive Into Python [EB\/OL] (2000). http:\/\/www.diveintopython.com\/"},{"key":"52_CR24","unstructured":"Hartstein, B.: Jsunpack: an automatic JavaScript unpacker (2009)"},{"key":"52_CR25","unstructured":"Page, L., et al.: The PageRank citation ranking: bringing order to the web (1999)"},{"key":"52_CR26","doi-asserted-by":"crossref","unstructured":"Das Sarma, A., et al.: Fast distributed PageRank computation. Theor. Comput. Sci. (2014)","DOI":"10.1007\/978-3-642-35668-1_2"},{"key":"52_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/11790754_4","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"M Polychronakis","year":"2006","unstructured":"Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Network-level polymorphic shellcode detection using emulation. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 54\u201373. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11790754_4"},{"key":"52_CR28","first-page":"1","volume":"8","author":"M Daniel","year":"2008","unstructured":"Daniel, M., Honoroff, J., Miller, C.: Engineering heap overflow exploits with JavaScript. WOOT 8, 1\u20136 (2008)","journal-title":"WOOT"},{"key":"52_CR29","unstructured":"Hallaraker, O., Vigna, G.: Detecting malicious JavaScript code in Mozilla. IEEE (2005)"},{"key":"52_CR30","unstructured":"Shkapenyuk, V., Suel, T.: Design and implementation of a high-performance distributed web crawler. IEEE (2002)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T17:02:25Z","timestamp":1571936545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}