{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T11:10:10Z","timestamp":1751627410654,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976285","type":"print"},{"value":"9783031976292","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97629-2_12","type":"book-chapter","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:30:51Z","timestamp":1751625051000},"page":"162-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Assessment of\u00a0LLM-Based Approaches to\u00a0Malicious Webpage Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9869-1587","authenticated-orcid":false,"given":"Gracjan","family":"Mak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0620-8123","authenticated-orcid":false,"given":"Mateusz","family":"Gniewkowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0381-9202","authenticated-orcid":false,"given":"Pawe\u0142","family":"Walkowiak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9203-5520","authenticated-orcid":false,"given":"Arkadiusz","family":"Janz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,5]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Al-Maamari, M., Istaiti, M., Zerhoudi, S., Dinzinger, M., Granitzer, M., Mitrovic, J.: A comprehensive dataset for webpage classification (part 1: Adult & malicious) (version 1) (2024). https:\/\/doi.org\/10.5281\/ZENODO.10775260","DOI":"10.5281\/ZENODO.10775260"},{"key":"12_CR2","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171\u20134186 (2019)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Gniewkowski, M., Maciejewski, H., Surmacz, T., Walentynowicz, W.: Sec2vec: anomaly detection in http traffic and malicious urls. In: Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing, pp. 1154\u20131162 (2023)","DOI":"10.1145\/3555776.3577663"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.comcom.2021.04.023","volume":"175","author":"BB Gupta","year":"2021","unstructured":"Gupta, B.B., Yadav, K., Razzak, I., Psannis, K., Castiglione, A., Chang, X.: A novel approach for phishing urls detection using lexical based machine learning in a real-time environment. Comput. Commun. 175, 47\u201357 (2021)","journal-title":"Comput. Commun."},{"key":"12_CR5","unstructured":"Johnson, C., Khadka, B., Basnet, R.B., Doleck, T.: Towards detecting and classifying malicious urls using deep learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4), 31\u201348 (2020)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Li, J., Ji, S., Du, T., Li, B., Wang, T.: Textbugger: generating adversarial text against real-world applications. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, February 24-27, 2019. The Internet Society (2019). https:\/\/www.ndss-symposium.org\/ndss-paper\/textbugger-generating-adversarial-text-against-real-world-applications\/","DOI":"10.14722\/ndss.2019.23138"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Li, L., Gong, B.: Prompting large language models for malicious webpage detection. In: 2023 IEEE 4th International Conference on Pattern Recognition and Machine Learning (PRML). pp. 393\u2013400 (2023). https:\/\/doi.org\/10.1109\/PRML59573.2023.10348229","DOI":"10.1109\/PRML59573.2023.10348229"},{"key":"12_CR8","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"12_CR9","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. Adv. Neural Inf. Proc. Syst. textbf30 (2017)"},{"issue":"8","key":"12_CR10","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/TII.2020.3038761","volume":"17","author":"C Luo","year":"2020","unstructured":"Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., Tian, Z.: A novel web attack detection system for internet of things via ensemble classification. IEEE Trans. Ind. Inform. 17(8), 5810\u20135818 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., et\u00a0al.: Application of the generic feature selection measure in detection of web attacks. In: Computational Intelligence in Security for Information Systems, pp. 25\u201332. Springer (2011)","DOI":"10.1007\/978-3-642-21323-6_4"},{"key":"12_CR12","unstructured":"Yao, S.,: Tree of thoughts: deliberate problem solving with large language models. In: Proceedings of the 37th International Conference on Neural Information Processing Systems. NIPS \u201923, Curran Associates Inc., Red Hook, NY (2023)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97629-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:30:56Z","timestamp":1751625056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97629-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976285","9783031976292"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97629-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This study applied large language models for the detection of malicious web pages and JavaScript files, using publicly available data sets in compliance with data protection regulations. We acknowledge the ethical implications of AI in cybersecurity, aiming to improve threat detection and minimize false positives for safer web environments. The research did not involve human participants, and no informed consent was required for the use of public data.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Statement"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}