{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:16:53Z","timestamp":1743045413924,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031203084"},{"type":"electronic","value":"9783031203091"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20309-1_14","type":"book-chapter","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T06:11:35Z","timestamp":1670393495000},"page":"155-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Integrated Chinese Malicious Webpages Detection Method Based on Pre-trained Language Models and Feature Fusion"],"prefix":"10.1007","author":[{"given":"Yanting","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"14_CR1","unstructured":"CNNIC. The 49th China Statistical Report on Internet Development. http:\/\/www.cnnic.cn\/hlwfzyj\/hlwxzbg\/. Accessed 28 Mar 2022"},{"key":"14_CR2","unstructured":"Zzhihao. CN-Malicious-website-list. https:\/\/github.com\/zzhihao2017\/CN-Malicious-website-list. Accessed 28 Mar 2022"},{"key":"14_CR3","unstructured":"National Internet Emergency Center. 2020 China Internet Network Security Report. https:\/\/www.cert.org.cn\/publish\/main\/17\/index.html. Accessed 28 Mar 2022"},{"key":"14_CR4","unstructured":"Wan, M., Yao, H.: GAN model for malicious web training data generation. Comput. Eng. Appl. (6), 1\u201310 (2020)"},{"issue":"8","key":"14_CR5","doi-asserted-by":"publisher","first-page":"3016","DOI":"10.1007\/s10489-019-01433-4","volume":"49","author":"H Wang","year":"2019","unstructured":"Wang, H., Yu, L., Tian, S.W., et al.: Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl. Intell. 49(8), 3016\u20133026 (2019)","journal-title":"Appl. Intell."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Peng, Y., Tian, S., Yu, L.: A joint approach to detect malicious URL based on attention mechanism. Int. J. Comput. Intell. Appl. 18(3) (2019)","DOI":"10.1142\/S1469026819500214"},{"key":"14_CR7","unstructured":"Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL Detection using Machine Learning: A Survey. arXiv e-prints, 1701-7179 (2017)"},{"key":"14_CR8","unstructured":"Devlin, J., Chang, M., Lee, K., et al.: BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv e-prints, 1810-4805 (2018)"},{"key":"14_CR9","unstructured":"Liu, Y., Ott, M., Goyal, N., et al.: RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv e-prints, 1907-11692 (2019)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Tao, W., Yu, S., Xie, B.: A novel framework for learning to detect malicious web pages. In: 2010 International Forum on Information Technology and Applications, vol. 2, pp. 353\u2013357 (2010)","DOI":"10.1109\/IFITA.2010.173"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Gowtham, R., Krishnamurthi, et al.: A comprehensive and efficacious architecture for detecting phishing webpages. Comput. Secur. 40, 23\u201337 (2014)","DOI":"10.1016\/j.cose.2013.10.004"},{"key":"14_CR12","unstructured":"Xu, L.: A research of phishing detection technology based on deep learning. University of Electronic Science and Technology of China, ChengDu (2017)"},{"key":"14_CR13","unstructured":"Ye, Z.: Designing and application of a large-scale and fast malicious web page recognition method based on combination of Kafka and spark-streaming. Nanjing University of Posts and telecommunications, Nanjing (2019)"},{"key":"14_CR14","unstructured":"Wei, X., Cheng, W.: Malicious web page recognition based on feature fusion and machine learning. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) (5), 95\u2013104 (2019)"},{"key":"14_CR15","unstructured":"Hu, Z., Wang, C., Wu, J., et al.: Malicious websites identification based on hyperlink analysis and classification rule. J. Inf. Resour. Manag. (1), 105\u2013113 (2019)"},{"key":"14_CR16","unstructured":"Wu, H.: Research and implementation of activate defense technology for malicious crawlers. Beijing University of posts and telecommunications, Beijing (2019)"},{"key":"14_CR17","unstructured":"Zhou, W.: Machine learning based malicious webpage analysis. Shanghai Jiaotong University, Shanghai (2019)"},{"key":"14_CR18","unstructured":"Chen, B., Song, L.: Malicious webpage detection method for webpage content link hierarchy semantic tree. Comput. Eng. Appl. (11), 90\u201397 (2020)"},{"key":"14_CR19","unstructured":"Sha, H., Liu, Q., Liu, T., et al.: Survey on malicious webpage detection research. Chin. J. Comput. (3), 529\u2013542 (2016)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Seifert, C., Komisarczuk, P., Welch, I., et al.: Identification of malicious web pages through analysis of underlying DNS and web server relationships. In: IEEE Conference on Local Computer Networks, pp. 935\u2013941 (2008)","DOI":"10.1109\/ATNAC.2008.4783302"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Spirin, N., Han, J.: Survey on web spam detection. ACM SIGKDD Explor. Newsl. 13(2), 50 (2012)","DOI":"10.1145\/2207243.2207252"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Chiew, K.L., Tan, C.L., Wong, K.S., et al.: A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf. Sci. (484 ),153\u2013166 (2019)","DOI":"10.1016\/j.ins.2019.01.064"},{"key":"14_CR23","unstructured":"Le, H., Pham, Q., Sahoo, D., et al.: URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. arXiv e-prints, 1802-3162 (2018)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Peng, P., Yang, L., Song, L.: Opening the blackbox of virustotal: analyzing online phishing scan engines. In: The Internet Measurement Conference, pp. 478\u2013485 (2019)","DOI":"10.1145\/3355369.3355585"},{"key":"14_CR25","unstructured":"Sheng, S., Wardman, B., Warner, G., et al.: An empirical analysis of phishing blacklists. In: 6th Conference on Email and Anti-Spam, CEAS 2009, Mountain View, CA, United states (2009)"},{"key":"14_CR26","unstructured":"Saxe, J., Berlin, K.: eXpose: A Character-Level Convolutional Neural Network with Embed dings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv e-prints, 1702-8568 (2017)"},{"key":"14_CR27","unstructured":"Zhou, Z.: Machine Learning, pp. 178\u2013181. Tsinghua University Press, Beijing (2016)"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"Sun, C., Qiu, X., Xu, Y., Huang, X.: How to fine-tune BERT for text classification? In: Sun, M., Huang, X., Ji, H., Liu, Z., Liu, Y. (eds.) CCL 2019. LNCS, vol. 11856, pp. 194\u2013206. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32381-3_16","DOI":"10.1007\/978-3-030-32381-3_16"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-030-60029-7_27","volume-title":"Web Information Systems and Applications","author":"P Yu","year":"2020","unstructured":"Yu, P., Wang, X.: BERT-based named entity recognition in Chinese twenty-four histories. In: Wang, G., Lin, X., Hendler, J., Song, W., Xu, Z., Liu, G. (eds.) WISA 2020. LNCS, vol. 12432, pp. 289\u2013301. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60029-7_27"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20309-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T20:04:53Z","timestamp":1674590693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20309-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031203084","9783031203091"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20309-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa22022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.ccf.org.cn\/web\/html7\/index.html?globalId=m9475032704175349761645943983427&type=1","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"212","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}