{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:50:07Z","timestamp":1742961007411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_15","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"152-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Domain Knowledge: Predicting the Kind of Content Hosted by a Domain"],"prefix":"10.1007","author":[{"given":"Suriyan","family":"Laohaprapanon","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Sood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"15_CR1","first-page":"265","volume":"16","author":"M Abadi","year":"2016","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., et al.: Tensorflow: a system for large-scale machine learning. OSDI 16, 265\u2013283 (2016)","journal-title":"OSDI"},{"issue":"2","key":"15_CR2","first-page":"128","volume":"4","author":"M Aldwairi","year":"2012","unstructured":"Aldwairi, M., Alsalman, R.: Malurls: a lightweight malicious website classification based on url features. J. Emerg. Technol. Web Intell. 4(2), 128\u2013133 (2012)","journal-title":"J. Emerg. Technol. Web Intell."},{"key":"15_CR3","unstructured":"Amazon: Alexa top 1m domains (2017)"},{"key":"15_CR4","unstructured":"Chollet, F., et\u00a0al.: Keras (2015)"},{"key":"15_CR5","unstructured":"Cor, K., Sood, G.: Pwned: how often are Americans\u2019 online accounts breached? arXiv preprint \narXiv:1808.01883\n\n (2018)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Deri, L., Martinelli, M., Sartiano, D., Serrecchia, M., Sideri, L., Prignoli, S.: Implementing web classification for TLDS. In: 2015 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), vol.\u00a01, pp. 85\u201388. IEEE (2015)","DOI":"10.1109\/WI-IAT.2015.112"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM (1999)","DOI":"10.1049\/cp:19991218"},{"issue":"5\u20136","key":"15_CR8","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","volume":"18","author":"A Graves","year":"2005","unstructured":"Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5\u20136), 602\u2013610 (2005)","journal-title":"Neural Netw."},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1002\/ab.20328","volume":"36","author":"GM Hald","year":"2010","unstructured":"Hald, G.M., Malamuth, N.M., Yuen, C.: Pornography and attitudes supporting violence against women: revisiting the relationship in nonexperimental studies. Aggress. Behav.: Off. J. Int. Soc. Res. Aggress. 36(1), 14\u201320 (2010)","journal-title":"Aggress. Behav.: Off. J. Int. Soc. Res. Aggress."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Gupta, B.: Phish-safe: url features-based phishing detection system using machine learning. In: Cyber Security, pp. 467\u2013474. Springer (2018)","DOI":"10.1007\/978-981-10-8536-9_44"},{"key":"15_CR11","unstructured":"Shalla Secure Services KG: Shalla\u2019s blacklists (2017)"},{"key":"15_CR12","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint \narXiv:1412.6980\n\n (2014)"},{"key":"15_CR13","unstructured":"Netcraft: January 2018 web server survey (2018). Accessed 11 Nov 2018"},{"key":"15_CR14","unstructured":"OpenDNS, L.: PhishTank: an anti-phishing site (2017)"},{"key":"15_CR15","unstructured":"Prigent, F.: Toulouse\/squidguard blacklist (2017)"},{"key":"15_CR16","unstructured":"RiskAnalytics: Malware domains (2017)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Shen, D., Chen, Z., Yang, Q., Zeng, H.J., Zhang, B., Lu, Y., Ma, W.Y.: Web-page classification through summarization. In: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 242\u2013249 (2004)","DOI":"10.1145\/1008992.1009035"},{"issue":"1","key":"15_CR18","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"issue":"8","key":"15_CR19","doi-asserted-by":"publisher","first-page":"3016","DOI":"10.1007\/s10489-019-01433-4","volume":"49","author":"HH Wang","year":"2019","unstructured":"Wang, H.H., Yu, L., Tian, S.W., Peng, Y.F., Pei, X.J.: Bidirectional LSTM malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl. Intell. 49(8), 3016\u20133026 (2019)","journal-title":"Appl. Intell."},{"key":"15_CR20","unstructured":"Westcott, K., Loucks, J., Littmann, D., Wilson, P., Srivastava, S., Ciampa, D.: Connectivity and mobile trends survey (2019). \nhttps:\/\/www2.deloitte.com\/us\/en\/pages\/technology-media-and-telecommunications\/articles\/global-mobileconsumer-survey-us-edition.html"},{"issue":"2","key":"15_CR21","first-page":"75","volume":"20","author":"JB Zhang","year":"2010","unstructured":"Zhang, J.B., Xu, Z.M., Xiu, K.I., Pan, Q.S.: A web site classification approach based on its topological structure. Int. J. Asian Lang. Proc. 20(2), 75\u201386 (2010)","journal-title":"Int. J. Asian Lang. Proc."}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:10:21Z","timestamp":1599477021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}