{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:41:50Z","timestamp":1726069310759},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_5","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T19:03:38Z","timestamp":1582830218000},"page":"65-77","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Malicious Websites by Query Templates"],"prefix":"10.1007","author":[{"given":"Satomi","family":"Kaneko","sequence":"first","affiliation":[]},{"given":"Akira","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[]},{"given":"Tran Phuong","family":"Thao","sequence":"additional","affiliation":[]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Abdelhamid, N., Ayesh, A., Thabtah, F.: Phishing detection based associative classification data mining. Expert Syst. Appl. 41(13), 5948\u20135959 (2014). \nhttps:\/\/doi.org\/10.1016\/j.eswa.2014.03.019\n\n. \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417414001481","key":"5_CR1","DOI":"10.1016\/j.eswa.2014.03.019"},{"doi-asserted-by":"publisher","unstructured":"Ding, Y., Luktarhan, N., Li, K., Slamu, W.: A keyword-based combination approach for detecting phishing webpages. Comput. Secur. 84, 256\u2013275 (2019). \nhttps:\/\/doi.org\/10.1016\/j.cose.2019.03.018\n\n. \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404819300707","key":"5_CR2","DOI":"10.1016\/j.cose.2019.03.018"},{"unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters a density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD 1996, pp. 226\u2013231. AAAI Press (1996). \nhttp:\/\/dl.acm.org\/citation.cfm?id=3001460.3001507","key":"5_CR3"},{"unstructured":"Google: Collect campaign data with custom URLs. \nhttps:\/\/support.google.com\/analytics\/answer\/1033863","key":"5_CR4"},{"unstructured":"Google: Google safe browsing. \nhttps:\/\/safebrowsing.google.com","key":"5_CR5"},{"doi-asserted-by":"publisher","unstructured":"Kim, S., Kim, J., Kang, B.: Malicious URL protection based on attackers\u2019 habitual behavioral analysis. Comput. Secur. (2018). \nhttps:\/\/doi.org\/10.1016\/j.cose.2018.01.013","key":"5_CR6","DOI":"10.1016\/j.cose.2018.01.013"},{"unstructured":"Malwarebytes: Cybercrime tactics and techniques Q1 2017. \nhttps:\/\/www.malwarebytes.com\/pdf\/labs\/Cybercrime-Tactics-and-Techniques-Q1-2017.pdf","key":"5_CR7"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1587\/transinf.2017EDP7294","volume":"E101D","author":"S Mizuno","year":"2018","unstructured":"Mizuno, S., Hatada, M., Mori, T., Goto, S.: Detecting malware-infected devices using the http header patterns. IEICE Trans. Inf. Syst. E101D(5), 1370\u20131379 (2018). \nhttps:\/\/doi.org\/10.1587\/transinf.2017EDP7294","journal-title":"IEICE Trans. Inf. Syst."},{"unstructured":"SeleniumHQ: Selenium WebDriver. \nhttps:\/\/docs.seleniumhq.org\/projects\/webdriver","key":"5_CR9"},{"unstructured":"Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J.I., Zhang, C.: An empirical analysis of phishing blacklists. In: Conference on Email and Anti-Spam (2009)","key":"5_CR10"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2016.76","volume":"14","author":"AK Sood","year":"2016","unstructured":"Sood, A.K., Zeadally, S.: A taxonomy of domain-generation algorithms. IEEE Secur. Privacy 14(4), 46\u201353 (2016). \nhttps:\/\/doi.org\/10.1109\/MSP.2016.76","journal-title":"IEEE Secur. Privacy"},{"unstructured":"Symantec: Internet security threat report volume 24. \nhttps:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf","key":"5_CR12"},{"unstructured":"Thao, T.P., Makanju, T., Urakawa, J., Yamada, A., Murakami, K., Kubota, A.: Large-scale analysis of domain blacklists. In: Proceedings of the 11th International Conference on Emerging Security Information, Systems and Technologies (2017)","key":"5_CR13"},{"unstructured":"Verisign: Internet grows to 348.7 million domain name registrations in the fourth quarter of 2018. \nhttps:\/\/investor.verisign.com\/news-releases\/news-release-details\/internet-grows-3487-million-domain-name-registrations-fourth","key":"5_CR14"},{"doi-asserted-by":"crossref","unstructured":"Zhang, J., Seifert, C., Stokes, J., Lee, W.: Arrow: generating signatures to detect drive-by downloads. In: Proceedings of the International Conference on World Wide Web (2011). \nhttps:\/\/www.microsoft.com\/en-us\/research\/publication\/arrow-generating-signatures-to-detect-drive-by-downloads\/","key":"5_CR15","DOI":"10.1145\/1963405.1963435"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T19:04:29Z","timestamp":1582830269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}