{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:44:38Z","timestamp":1742931878810,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265605"},{"type":"electronic","value":"9783319265612"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26561-2_74","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T03:15:22Z","timestamp":1447730122000},"page":"631-638","source":"Crossref","is-referenced-by-count":1,"title":["Using NLP Specific Tools for Non-NLP Specific Tasks. A Web Security Application"],"prefix":"10.1007","author":[{"given":"Octavia-Maria","family":"\u0218ulea","sequence":"first","affiliation":[]},{"given":"Liviu P.","family":"Dinu","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Pe\u015fte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"74_CR1","first-page":"128","volume":"4","author":"M Aldwairi","year":"2012","unstructured":"Aldwairi, M., Alsalman, R.: Malurls: a lightweight malicious website classification based on url features. J. Emerg. Technol. Web Intell. 4, 128\u2013133 (2012)","journal-title":"J. Emerg. Technol. Web Intell."},{"key":"74_CR2","unstructured":"Baayen, R.H., van Halteren, H., Neijt, A., Tweedie, F.: An experiment in authorship attribution. In: IEEE Intelligent Systems and Their Applications (2002)"},{"key":"74_CR3","unstructured":"Chaski, C.E.: The computational-linguistic approach to forensic authorship attribution. In: Olsen, F., Lorz, A., Stein, D. (eds.) Law and Language: Theory and Practice. D\u00fcsseldorf University Press (2008)"},{"key":"74_CR4","unstructured":"Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Fox, A. (ed.) 2nd USENIX Conference on Web Application Development, WebApps 2011, 15\u201316 June 2011. USENIX Association, Portland (2011)"},{"key":"74_CR5","unstructured":"Dinu, L.P., Popescu, M., Dinu, A.: Authorship identification of romanian texts with controversial paternity. In: Proceedings of the International Conference on Language Resources and Evaluation, LREC 2008, 26 May \u2013 1 June 2008. European Language Resources Association, Marrakech (2008)"},{"key":"74_CR6","first-page":"1871","volume":"9","author":"RE Fan","year":"2008","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: Liblinear: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"74_CR7","unstructured":"Goodfellow, I.J., Warde-Farley, D., Lamblin, P., Dumoulin, V., Mirza, M., Pascanu, R., Bergstra, J., Bastien, F., Bengio, Y.: Pylearn2: a machine learning research library (2013). arXiv preprint arXiv:1308.4214"},{"key":"74_CR8","volume-title":"Gray Hat Hacking: The Ethical Hacker\u2019s Handbook","author":"A Harper","year":"2011","unstructured":"Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G., Williams, T.: Gray Hat Hacking: The Ethical Hacker\u2019s Handbook, 3rd edn. McGraw-Hill, New York (2011)","edition":"3"},{"key":"74_CR9","doi-asserted-by":"crossref","unstructured":"Kan, M., Thi, H.O.N.: Fast webpage classification using URL features. In: Herzog, O., Schek, H., Fuhr, N., Chowdhury, A., Teiken, W. (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, pp. 325\u2013326. ACM, Bremen, October 31 - November 5 (2005)","DOI":"10.1145\/1099554.1099649"},{"key":"74_CR10","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: IV, J.F.E., Fogelman-Souli\u00e9, F., Flach, P.A., Zaki, M.J. (eds.) Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"74_CR11","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"74_CR12","unstructured":"Van Hulse, J., Khoshgoftaar, T.M., Napolitano, A.: Experimental perspectives on learning from imbalanced data. In: Proceedings of the 24th International Conference on Machine Learning, ICML 2007, pp. 935\u2013942. ACM, New York (2007). http:\/\/doi.acm.org\/10.1145\/1273496.1273614"},{"issue":"7","key":"74_CR13","doi-asserted-by":"publisher","first-page":"e67863","DOI":"10.1371\/journal.pone.0067863","volume":"8","author":"Q Wei","year":"2013","unstructured":"Wei, Q., Dunbrack Jr, R.L.: The role of balanced training and testing data sets for binary classifiers in bioinformatics. PLoS One 8(7), e67863 (2013)","journal-title":"PLoS One"},{"key":"74_CR14","unstructured":"Weiss, G., Provost, F.: The effect of class distribution on classifier learning: an empirical study. Technical report (2001)"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26561-2_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T21:46:59Z","timestamp":1692136019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26561-2_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265605","9783319265612"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26561-2_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}