{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:45:43Z","timestamp":1743086743553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_20","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"372-389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Risk Evaluation of X.509 Certificates \u2013 A Machine Learning Application"],"prefix":"10.1007","author":[{"given":"Varsharani","family":"Hawanna","sequence":"first","affiliation":[]},{"given":"Vrushali","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Rashmi","family":"Rane","sequence":"additional","affiliation":[]},{"given":"Pooja","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"unstructured":"Dan Ahmed, B.: A model for automatically evaluating trust in X.509 certificates. Cybernetica Research Report 2010, pp. 12\u201316 (2010)","key":"20_CR1"},{"unstructured":"Alexa.com. The Web Information Company. http:\/\/www.alexa.com","key":"20_CR2"},{"doi-asserted-by":"crossref","unstructured":"Brubaker, C., Jana, S., Ray, B., Khurshid, S., Shmatikov, V.: Using frankencerts for automated adversarial testing of certificate validation in SSL\/TLS implementations. In: Security and Privacy (SP) Symposium, pp. 114\u2013129. IEEE, May 2014","key":"20_CR3","DOI":"10.1109\/SP.2014.15"},{"doi-asserted-by":"crossref","unstructured":"Batarfi, O., Marshall, L.: Defining criteria for rating an entity\u2019s trustworthiness based on its certificate policy. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006). IEEE, April 2006","key":"20_CR4","DOI":"10.1109\/ARES.2006.47"},{"unstructured":"Curry, I.: Version 3 X. 509 Certificates. Entrust Technologies (1996)","key":"20_CR5"},{"doi-asserted-by":"crossref","unstructured":"Alfaro, E., Gamez, M., Garcia, N.: A adabag: an r package for classification with boosting and bagging. J. Stat. Softw. 54(2), August 2013","key":"20_CR6","DOI":"10.18637\/jss.v054.i02"},{"doi-asserted-by":"crossref","unstructured":"Ford, W., Chokhani, S., CygnaCom, Inc., VeriSign, Inc. Certificate Policy and Certification Practices Framework, RFC 2527, March 1999","key":"20_CR7","DOI":"10.17487\/rfc2527"},{"unstructured":"Ghafarian, A.: An empirical study of network forensics analysis tools. In: ICCWS2014-9th International Conference on Cyber Warfare & Security, p. 366, March 2014","key":"20_CR8"},{"unstructured":"Googles article. Google calls out certificate authorities that can no longer be trusted. Infoworld 28 March 2016","key":"20_CR9"},{"doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280 (2002)","key":"20_CR10","DOI":"10.17487\/rfc3280"},{"unstructured":"Quinlan, J.R.: Bagging, boosting, and C4.5. In: AAAI (1996)","key":"20_CR11"},{"doi-asserted-by":"crossref","unstructured":"Breiman, L., Cutler, A.: Breiman and Cutler\u2019s Random Forests for Classification and Regression, 7 October 2015","key":"20_CR12","DOI":"10.1002\/9781118445112.stat06520"},{"unstructured":"Breiman, L.: Random Forests, January 2001","key":"20_CR13"},{"doi-asserted-by":"crossref","unstructured":"Breiman, L.: Bagging predictors, Mach. Learn. 24(2), 123,140 (1996)","key":"20_CR14","DOI":"10.1007\/BF00058655"},{"unstructured":"Mishari, M.A., Cristofaro, D.E., Defrawy, K.E., Tsudik, G.: Harvesting SSL certificate data to identify Web-fraud. arXiv preprint arXiv:0909.3688v4 [cs.CR], pp. 1\u201313, 13 January 2012","key":"20_CR15"},{"unstructured":"Roger, D., Peng, R.: Programming for Data Science, Leanpub publication, published on 20 July 2015","key":"20_CR16"},{"doi-asserted-by":"crossref","unstructured":"Sanders C.: Practical packet analysis: Using Wireshark to solve real-world network problems, 2nd edn. No Starch Press (2011)","key":"20_CR17","DOI":"10.1016\/S1353-4858(11)70082-4"},{"doi-asserted-by":"crossref","unstructured":"Samer, W.A., Romain, L., Francois, B.: A formal model of trust for calculating the quality of x. 509 certificate. Security and Communication Networks 2011, pp. 651\u2013665 (2011)","key":"20_CR18","DOI":"10.1002\/sec.198"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-16441-5_2","volume-title":"Public Key Infrastructures, Services and Applications","author":"Gabriel, A Weaver","year":"2010","unstructured":"Weaver, Gabriel, A., Rea, Scott, Smith, Sean, W.: A computational framework for certificate policy operations. In: Martinelli, Fabio, Preneel, Bart (eds.) EuroPKI 2009. LNCS, vol. 6391, pp. 17\u201333. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16441-5_2"},{"doi-asserted-by":"crossref","unstructured":"Wazan, A.S., Laborde, R., Barr\u00e8re, F., Benzekri, A.: The x. 509 trust model needs a technical and legal expert. In: 2012 IEEE International Conference on Communications (ICC), pp. 6895\u20136900, June 2012","key":"20_CR20","DOI":"10.1109\/ICC.2012.6364860"},{"doi-asserted-by":"crossref","unstructured":"Wazan, A.S., Laborde, R., Barr\u00e8re, F., Benzekri, A.: Validating X. 509 certificates based on their quality. In: The 9th International Conference for IEEE Young Computer Scientists, ICYCS 2008, pp. 2055\u20132060, 281\u2013304, November 2008","key":"20_CR21","DOI":"10.1109\/ICYCS.2008.75"},{"unstructured":"Webpage, Comparing Tree-Based Classification Methods via the Kaggle Otto Competition. http:\/\/www.r-bloggers.com\/comparing-tree-based-classification-methods-via-the-kaggle-otto-competition\/","key":"20_CR22"},{"doi-asserted-by":"crossref","unstructured":"Dong, Z., Kapadia, A., Blythe, J., Jean Camp, L.: Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates. IEEE (2015)","key":"20_CR23","DOI":"10.1109\/ECRIME.2015.7120795"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T17:07:29Z","timestamp":1657818449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}