{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:30:56Z","timestamp":1725798656850},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111667"},{"type":"electronic","value":"9783319111674"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11167-4_29","type":"book-chapter","created":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T02:28:52Z","timestamp":1407724132000},"page":"292-303","source":"Crossref","is-referenced-by-count":0,"title":["SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chaoshun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Shanqing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Lizhen","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Bannur, S.N., Saul, L.K., Savage, S.: Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 1\u201310. ACM (2011)","DOI":"10.1145\/2046684.2046686"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-02918-9_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Egele","year":"2009","unstructured":"Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol.\u00a05587, pp. 88\u2013106. Springer, Heidelberg (2009)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Eshete, B., Villafiorita, A., Weldemariam, K.: Malicious website detection: Effectiveness and efficiency issues. In: 2011 First SysSec Workshop (SysSec), pp. 123\u2013126. IEEE (2011)","DOI":"10.1109\/SysSec.2011.9"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Gamayunov, D., Quan, N., Sakharov, F., Toroshchin, E.: Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow. In: 2009 European Conference on Computer Network Defense (EC2ND), pp. 4\u201312. IEEE (2009)","DOI":"10.1109\/EC2ND.2009.9"},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.eswa.2009.05.023","volume":"37","author":"Y.-T. Hou","year":"2010","unstructured":"Hou, Y.-T., Chang, Y., Chen, T., Laih, C.-S., Chen, C.-M.: Malicious web content detection by machine learning. Expert Systems with Applications\u00a037(1), 55\u201360 (2010)","journal-title":"Expert Systems with Applications"},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.jnca.2013.03.009","volume":"38","author":"G.K. Jayasinghe","year":"2014","unstructured":"Jayasinghe, G.K., Shane Culpepper, J., Bertok, P.: Efficient and effective realtime prediction of drive-by download attacks. Journal of Network and Computer Applications\u00a038, 135\u2013149 (2014)","journal-title":"Journal of Network and Computer Applications"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Likarish, P., Jung, E., Jo, I.: Obfuscated malicious javascript detection using classification techniques. In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 47\u201354. IEEE (2009)","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Lu, L., Yegneswaran, V., Porras, P., Lee, W.: Blade: an attack-agnostic approach for preventing drive-by malware infections. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 440\u2013450. ACM (2010)","DOI":"10.1145\/1866307.1866356"},{"key":"29_CR9","unstructured":"Ratanaworabhan, P., Livshits, V.B., Zorn, B.G.: Nozzle: A defense against heap-spraying code injection attacks. In: USENIX Security Symposium, pp. 169\u2013186 (2009)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Seifert, C., Komisarczuk, P., Welch, I.: True positive cost curve: A cost-based evaluation method for high-interaction client honeypots. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp. 63\u201369. IEEE (2009)","DOI":"10.1109\/SECURWARE.2009.17"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Seifert, C., Welch, I., Komisarczuk, P.: Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. In: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 1426\u20131432. ACM (2008)","DOI":"10.1145\/1363686.1364018"},{"issue":"1","key":"29_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2008.30","volume":"7","author":"X. Wang","year":"2010","unstructured":"Wang, X., Pan, C.-C., Liu, P., Zhu, S.: Sigfree: A signature-free buffer overflow attack blocker. IEEE Transactions on Dependable and Secure Computing\u00a07(1), 65\u201379 (2010)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"29_CR13","unstructured":"Wang, Y.-M., Niu, Y., Chen, H., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Strider honeymonkeys: Active, client-side honeypots for finding malicious websites (2007), \n                    \n                      http:\/\/research.microsoft.com\/users\/shuochen\/HM.PDF"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Reeves, D.S., Ning, P., Iyer, S.P.: Analyzing network traffic to detect self-decrypting exploit code. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 4\u201312. ACM (2007)","DOI":"10.1145\/1229285.1229291"}],"container-title":["Lecture Notes in Computer Science","Internet of Vehicles \u2013 Technologies and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11167-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T10:57:05Z","timestamp":1558954625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11167-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111667","9783319111674"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11167-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}