{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:59:37Z","timestamp":1725868777384},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_47","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T06:33:13Z","timestamp":1477031593000},"page":"483-490","source":"Crossref","is-referenced-by-count":0,"title":["Real-Time Malicious Script Blocking Technology at the Host-Level"],"prefix":"10.1007","author":[{"given":"SangHwan","family":"Oh","sequence":"first","affiliation":[]},{"given":"HanChul","family":"Bae","sequence":"additional","affiliation":[]},{"given":"Seongmin","family":"Park","sequence":"additional","affiliation":[]},{"given":"HwanKuk","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"47_CR1","unstructured":"W3C, \u201cHTML5 Standard\u201d, April 20 2015, \nhttp:\/\/www.w3.org\/standards"},{"key":"47_CR2","unstructured":"Gartner, \u201cGartner Identifies Top 10 Mobile Technologies and Capabilities for 2015 and 2016\u201d, February 24 2014."},{"key":"47_CR3","unstructured":"KISA, WebCheck. Available: \nhttp:\/\/webcheck.kisa.or.kr"},{"key":"47_CR4","unstructured":"McAfee. SiteAdviser. Available : \nhttp:\/\/www.siteadvisor.com"},{"key":"47_CR5","unstructured":"Young-wook Lee, Dong-jae Jeong, Sang-hoon Jeon, and Chae-ho Im, \u201cDesign and Implementation of Web-browser based Malicious behavior Detection System(WMDS)\u201d Journal of Information Security & Cryptology June, 2012"},{"key":"47_CR6","unstructured":"Tinyproxy, \nhttps:\/\/tinyproxy.github.io\/"},{"key":"47_CR7","unstructured":"YARA Documentation, \nhttp:\/\/yara.readthedocs.org\/en\/latest\/index.html"},{"key":"47_CR8","unstructured":"Chrome V8, \nhttps:\/\/developers.google.com\/v8"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T06:48:23Z","timestamp":1477032503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_47","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}