{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:12:40Z","timestamp":1743088360476,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031232091"},{"type":"electronic","value":"9783031232107"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-23210-7_21","type":"book-chapter","created":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T21:25:04Z","timestamp":1677014704000},"page":"191-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Threat Detection in\u00a0URLs by\u00a0Applying Machine Learning Algorithms*"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4215-8933","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Bustos-Tabernero","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2224-4957","authenticated-orcid":false,"given":"Daniel","family":"L\u00f3pez-S\u00e1nchez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ang\u00e9lica","family":"Gonz\u00e1lez Arrieta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"21_CR1","unstructured":"Certified Information Systems Auditor (CISA): Qbot\/Qakbot Malware Report. Oct. 29, 2020. https:\/\/www.cisa.gov\/stopransomware\/qbotqakbot-malware-report (visited on 08 May 2022)"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Basarslan, M.S., Kayaalp, F.: Sentiment analysis with machine learning methods on social media 9, 5\u201315 (2020). https:\/\/doi.org\/10.14201\/ADCAIJ202093515","DOI":"10.14201\/ADCAIJ202093515"},{"key":"21_CR3","unstructured":"UK-CERT: An introduction to threat intelligence (2014). https:\/\/www.ncsc.gov.uk\/files\/An-introduction-to-threat-intelligence.pdf (visited on 30 Dec 2021)"},{"key":"21_CR4","unstructured":"Canadian Institute for Cybersecurity. URL dataset (ISCX-URL2016). http:\/\/205.174.165.80\/CICDataset\/ISCX- URL- 2016\/ (visited on 28 Jan 2022)"},{"key":"21_CR5","unstructured":"Fern\u00e1ndez, G.: Confirmo, los operadores de #Emotet ocupan el mismo proveedor de Webshells que ocupa TR distribution con #Qakbot o #Squirrelwaffle. Jan. 24, 2022. https:\/\/twitter.com\/1ZRR4H\/status\/1485413045975330822?s=20 &t=cuUfe7pnr7sZ1YEYcqm7uQ (visited on 27 Jan 2022)"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Johnson, C., et al.: Guide to cyber threat information sharing 150 (2016). https:\/\/doi.org\/10.6028\/NIST.SP.800-150 (visited on 30 Dec 2021)","DOI":"10.6028\/NIST.SP.800-150"},{"key":"21_CR7","unstructured":"Kingma, D.P., Lei Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations, ICLR (2015)"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Kiruthiga, R., Akila, D.: Phishing websites detection using machine learning. Int. J. Recent Technol. Eng. 8(2 Special Issue 11 Sept. 2019), 111\u2013114. ISSN: 2277-3878 https:\/\/doi.org\/10.35940\/ijrte.B1018.0982S1119","DOI":"10.35940\/ijrte.B1018.0982S1119"},{"key":"21_CR9","unstructured":"Le, H., et al.: URLNet: learning a URL representation with deep learning for malicious URL detection. ArXiv (May 2018). arxiv.org\/abs\/1802.03162"},{"key":"21_CR10","unstructured":"McCormick, C.: Word2Vec Tutorial - The Skip-Gram Model. In: 2016"},{"key":"21_CR11","unstructured":"McMillan, R.: Definition: threat intelligence. In: Gartner Research (2013). https:\/\/www.gartner.com\/en\/documents\/2487216 (visited on 30 Dec 2021)"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Mikolov, T., et al.: Efficient estimation of word representations in vector space (2013). arxiv.org\/abs\/1301.3781. https:\/\/doi.org\/10.48550\/ARXIV.1301.3781","DOI":"10.48550\/ARXIV.1301.3781"},{"key":"21_CR13","unstructured":"MITREATT & CK. Emotet. https:\/\/attack.mitre.org\/software\/S0367\/ (visited on 08 May 2022)"},{"key":"21_CR14","unstructured":"MITREATT &CK. QakBot. https:\/\/attack.mitre.org\/software\/S0650\/ (visited on 08 May 2022)"},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Nikkhah, P., et al.: Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics, techniques, and procedures. Threat detection in URLs by applying machine learning algorithms 7. J. Inf. Proc. Syst. 15 (2021). https:\/\/doi.org\/10.3745\/JIPS.03.0126","DOI":"10.3745\/JIPS.03.0126"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Peng, T., Harris, I., Sawa, Y.: Detecting phishing attacks using natural language processing and machine learning. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC), pp. 300\u2013301 (2018). https:\/\/doi.org\/10.1109\/ICSC.2018.00056","DOI":"10.1109\/ICSC.2018.00056"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Pimpalkar, A.P., Retna Raj, R.J.: Influence of pre-processing strategies on the performance of ML classifiers exploiting TF-IDF and BOW features 9, 49\u201368. https:\/\/doi.org\/10.14201\/ADCAIJ2020924968","DOI":"10.14201\/ADCAIJ2020924968"},{"key":"21_CR18","doi-asserted-by":"publisher","unstructured":"Schneier, B.: How changing technology affects security. IEEE Secur. Priv. 10(2), 104\u2013104 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.39","DOI":"10.1109\/MSP.2012.39"},{"key":"21_CR19","unstructured":"J. Shad and S. Sharma. A Novel Machine Learning Approach to Detect Phishing Websites Jaypee Institute of Information Technology. 2018"},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"S\u00f6nmez, Y., et al.: Phishing web sites features classification based on extreme learning machine. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/ISDFS2018.8355342","DOI":"10.1109\/ISDFS2018.8355342"},{"key":"21_CR21","unstructured":"URLhaus. URLhaus - Malware URL exchange. https:\/\/urlhaus.abuse.ch\/ (visited on 28 Jan 2022)"},{"key":"21_CR22","doi-asserted-by":"publisher","unstructured":"Yuan, H., et al.: URL2Vec: URL modeling with character embeddings for fast and accurate phishing website detection, pp. 265\u2013272 (2018). https:\/\/doi.org\/10.1109\/BDCloud.2018.00050","DOI":"10.1109\/BDCloud.2018.00050"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Special Sessions, 19th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23210-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T12:06:07Z","timestamp":1700654767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23210-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031232091","9783031232107"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23210-7_21","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}