{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:20:20Z","timestamp":1764570020053,"version":"3.46.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944444"},{"type":"electronic","value":"9783031944451"}],"license":[{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94445-1_19","type":"book-chapter","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T17:14:09Z","timestamp":1757006049000},"page":"357-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Harnessing the\u00a0Power of\u00a0Quantum Computing for\u00a0URL Classification: A Comprehensive Study"],"prefix":"10.1007","author":[{"given":"Tariq","family":"Qayyum","sequence":"first","affiliation":[]},{"given":"Asadullah","family":"Tariq","sequence":"additional","affiliation":[]},{"given":"Muhammad Waqas","family":"Haseeb","sequence":"additional","affiliation":[]},{"given":"Saed","family":"Alrabae","sequence":"additional","affiliation":[]},{"given":"Zouheir","family":"Trabelsi","sequence":"additional","affiliation":[]},{"given":"Farag","family":"Sallabi","sequence":"additional","affiliation":[]},{"given":"Mohamed Adel","family":"Serhani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","DOI":"10.1016\/j.cose.2011.12.012"},{"issue":"7671","key":"19_CR2","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","volume":"549","author":"J Biamonte","year":"2017","unstructured":"Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., Lloyd, S.: Quantum machine learning. Nature 549(7671), 195\u2013202 (2017)","journal-title":"Nature"},{"issue":"12","key":"19_CR3","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1038\/s41567-019-0648-8","volume":"15","author":"I Cong","year":"2019","unstructured":"Cong, I., Choi, S., Lukin, M.D.: Quantum convolutional neural networks. Nature Phys. 15(12), 1273\u20131278 (2019). https:\/\/doi.org\/10.1038\/s41567-019-0648-8","journal-title":"Nature Phys."},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Xuan, C.D., Dinh, H., Victor, T.: Malicious URL Detection based on Machine Learning. Int. J. Adv. Comput. Sci. Appl. 11(1) (2020). https:\/\/doi.org\/10.14569\/IJACSA.2020.0110119","DOI":"10.14569\/IJACSA.2020.0110119"},{"issue":"1\u20133","key":"19_CR5","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1\u20133), 389\u2013422 (2002)","journal-title":"Mach. Learn."},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42484-020-00012-y","volume":"2","author":"M Henderson","year":"2020","unstructured":"Henderson, M., Shakya, S., Pradhan, S., Cook, T.: Quanvolutional neural networks: powering image recognition with quantum circuits. Quantum Mach. Intell. 2(1), 1\u20139 (2020). https:\/\/doi.org\/10.1007\/s42484-020-00012-y","journal-title":"Quantum Mach. Intell."},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Kapil, D., Bansal, A., Anupriya, Mehra, N., Joshi, A.: Machine learning based malicious URL detection. Int. J. Eng. Adv. Technol. 8(4s), 22\u201326 (2020). https:\/\/doi.org\/10.35940\/ijeat.D1006.0484S19","DOI":"10.35940\/ijeat.D1006.0484S19"},{"issue":"7553","key":"19_CR8","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Qayyum, T., Tariq, A., Haseeb, M.W., Lakas, A., Serhani, M.A., Trabelsi, Z.: Quantum-enhanced convolutional neural networks for image classification. In: 2023 IEEE Future Networks World Forum (FNWF), pp. 1\u20137. IEEE (2023)","DOI":"10.1109\/FNWF58287.2023.10520509"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 11\u201320 (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012). https:\/\/doi.org\/10.1016\/j.cose.2011.12.012","journal-title":"Comput. Secur."},{"key":"19_CR12","unstructured":"Siddhartha, M.: Malicious URLs dataset. https:\/\/www.kaggle.com\/datasets\/sid321axn\/malicious-urls-dataset (2022). Accessed 11 May 2023"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305\u2013316. IEEE (2010)","DOI":"10.1109\/SP.2010.25"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.procs.2021.10.082","volume":"194","author":"A Subasi","year":"2021","unstructured":"Subasi, A., Balfaqih, M., Balfagih, Z., Alfawwaz, K.: A comparative evaluation of ensemble classifiers for malicious webpage detection. Proc. Comput. Sci. 194, 272\u2013279 (2021)","journal-title":"Proc. Comput. Sci."},{"key":"19_CR15","unstructured":"Qiskit\u00a0Development Team. Qiskit: An open-source framework for quantum computing. https:\/\/qiskit.org (2019)"},{"key":"19_CR16","unstructured":"Woodbridge, J., Anderson, H.S., Ahuja, A., Grant, D.: Predicting domain generation algorithms with long short-term memory networks. ArXiv:1611.00791 (2016)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94445-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:16:18Z","timestamp":1764569778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94445-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,5]]},"ISBN":["9783031944444","9783031944451"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94445-1_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,5]]},"assertion":[{"value":"5 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}