{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:26:41Z","timestamp":1757705201382},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504711"},{"type":"electronic","value":"9783319504728"}],"license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50472-8_17","type":"book-chapter","created":{"date-parts":[[2016,11,25]],"date-time":"2016-11-25T11:17:15Z","timestamp":1480072635000},"page":"210-223","source":"Crossref","is-referenced-by-count":11,"title":["MalCrawler: A Crawler for Seeking and Crawling Malicious Websites"],"prefix":"10.1007","author":[{"given":"A. K.","family":"Singh","sequence":"first","affiliation":[]},{"given":"Navneet","family":"Goyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"key":"17_CR1","unstructured":"Symantec Corporation: Internet Security Threat Report 2016. Symantec (2016). http:\/\/www.symantec.com"},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.jnca.2013.03.009","volume":"38","author":"GK Jayasinghe","year":"2014","unstructured":"Jayasinghe, G.K., Culpepper, J.S., Bertok, P.: Efficient and effective realtime prediction of drive-by download attacks. J. Netw. Comput. Appl. 38, 135\u2013149 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Y., Pan, X., Chen, Y., Zhuge, J.: JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 466\u2013475 (2014)","DOI":"10.1145\/2664243.2664256"},{"key":"17_CR4","first-page":"1","volume":"3","author":"S Sarwade","year":"2013","unstructured":"Sarwade, S., Patil, P.D.D.: Document-based and URL-based features for automatic classification of cross-site scripting in web pages. IOSR J. Eng. 3, 1\u201310 (2013)","journal-title":"IOSR J. Eng."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Invernizzi, L., Benvenuti, S., Cova, M., Kruegel, C., Vigna, G.: EVILSEED\u202f: a guided approach to finding malicious web pages. In: IEEE Symposium on Security and Privacy (SP), pp. 428\u2013442 (2012)","DOI":"10.1109\/SP.2012.33"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Canali, D., Vigna, G., Kruegel, C.: Prophiler\u202f: a fast filter for the large-scale detection of malicious web pages. In: Proceeding of 20th International Conference on World Wide Web, pp. 197\u2013206 (2011)","DOI":"10.1145\/1963405.1963436"},{"issue":"4","key":"17_CR7","first-page":"517","volume":"2","author":"PS Rohit","year":"2013","unstructured":"Rohit, P.S., Krishnaveni, R.: Deep malicious website detection. Int. J. Comput. Sci. Mob. Comput. 2(4), 517\u2013522 (2013)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"17_CR8","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iFRAMEs point to us. In: USENIX Security Symposium (2008)"},{"issue":"1","key":"17_CR9","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.eswa.2009.05.023","volume":"37","author":"Y-T Hou","year":"2010","unstructured":"Hou, Y.-T., Chang, Y., Chen, T., Laih, C.-S., Chen, C.-M.: Malicious web content detection by machine learning. Expert Syst. Appl. 37(1), 55\u201360 (2010)","journal-title":"Expert Syst. Appl."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Pham, K., Santos, A., Freire, J.: Understanding website behavior based on user agent. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2016)","DOI":"10.1145\/2911451.2914757"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Likarish, P., Jung, E.: A targeted web crawling for building malicious javascript collection. In: Proceeding of the ACM DSMM, vol. 21, issue 4, pp. 23\u201326 (2009)","DOI":"10.1145\/1651309.1651317"},{"key":"17_CR12","first-page":"115","volume":"131","author":"HYI Jo","year":"2013","unstructured":"Jo, H.Y.I., Jung, E.: Interactive website filter for safe web browsing. J. Inf. Sci. 131, 115\u2013131 (2013)","journal-title":"J. Inf. Sci."},{"issue":"1","key":"17_CR13","first-page":"145","volume":"6","author":"MT Qassrawi","year":"2011","unstructured":"Qassrawi, M.T., Zhang, H.: Detecting malicious web servers with honeyclients. Directory Open Access J. (DOAJ) 6(1), 145\u2013152 (2011)","journal-title":"Directory Open Access J. (DOAJ)"},{"key":"17_CR14","unstructured":"Ikinci, A., Holz, T., Freiling, F.C.: Monkey-spider: detecting malicious websites with low-interaction honeyclients. Sicherheit, vol. 8 (2008)"},{"key":"17_CR15","unstructured":"JSoup- JSoup Java Library. http:\/\/www.jsoup.org"},{"key":"17_CR16","unstructured":"N.Z. Univeristy of Waikato, WEKA. http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"17_CR17","unstructured":"HtmlUnit. http:\/\/htmlunit.sourceforge.net\/"},{"key":"17_CR18","unstructured":"Rhino-Mozilla. https:\/\/developer.mozilla.org\/docs\/Mozilla\/Projects\/Rhino"},{"issue":"1","key":"17_CR19","first-page":"373","volume":"9","author":"F Karbalaie","year":"2012","unstructured":"Karbalaie, F., Sami, A., Ahmadi, M.: Semantic malware detection by deploying graph mining. Int. J. Comput. Sci. Issues (IJCSI) 9(1), 373\u2013379 (2012)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"17_CR20","unstructured":"Kaplan, S., Siefert, C., Livshits, B., Zorn, B., Curtsinger, C.: NoFus\u202f: automatically detecting obfuscated javascript code (2011)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Pintol, B.S., Barnete, R.: A novel algorithm for obfuscated code analysis. In: 2011 IEEE International Workshop of Information Forensics and Security (WIFS), pp. 1\u20135 (2011)","DOI":"10.1109\/WIFS.2011.6123157"},{"key":"17_CR22","unstructured":"Safe Browsing API. https:\/\/developers.google.com\/safe-browsing"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50472-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:31:04Z","timestamp":1498350664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50472-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"ISBN":["9783319504711","9783319504728"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50472-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,11,26]]}}}