{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:11Z","timestamp":1763507711508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319575285"},{"type":"electronic","value":"9783319575292"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57529-2_18","type":"book-chapter","created":{"date-parts":[[2017,4,22]],"date-time":"2017-04-22T12:28:36Z","timestamp":1492864116000},"page":"220-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Domain-Agnostic Approach to Spam-URL Detection via Redirects"],"prefix":"10.1007","author":[{"given":"Heeyoung","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Mirza Basim","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Leman","family":"Akoglu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"key":"18_CR1","unstructured":"Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: characterizing internet scam hosting infrastructure. In: Usenix Security (2007)"},{"key":"18_CR2","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: CEAS (2010)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: KDD, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: IMC (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, C.M.: @spam: the underground on 140 characters or less. In: CCS, pp. 27\u201337 (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"18_CR6","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: AIRWeb (2005)"},{"key":"18_CR7","unstructured":"Kindermann, R., Snell, J.L.: MRFs and their applications (1980)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: SIGIR (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"18_CR9","unstructured":"Lee, S., Kim, J.: WarningBird: detecting suspicious URLs in Twitter stream. In: NDSS (2012)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: KDD, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Lu, L., Perdisci, R., Lee, W.: SURF: detecting and measuring search poisoning. In: CCS, pp. 467\u2013476 (2011)","DOI":"10.1145\/2046707.2046762"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious Web sites from suspicious URLs. In: KDD, pp. 1245\u20131254 (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious URLs: an application of large-scale online learning. In: ICML (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"18_CR14","volume-title":"Decision Trees for Predictive Modeling","author":"PG Neville","year":"1999","unstructured":"Neville, P.G.: Decision Trees for Predictive Modeling. SAS Institute Inc., Cary (1999)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW (2007)","DOI":"10.1145\/1242572.1242600"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: CCS (2007)","DOI":"10.1145\/1315245.1315288"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based blacklists. In: Malicious & Unwanted Softw, IEEE (2008)","DOI":"10.1109\/MALWARE.2008.4690858"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC, pp. 1\u20139 (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Shady paths: leveraging surfing crowds to detect malicious web pages. In: CCS, pp. 133\u2013144 (2013)","DOI":"10.1145\/2508859.2516682"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time URL spam filtering service. In: IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"18_CR21","unstructured":"Wu, B., Davison, B.D.: Cloaking, redirection: a preliminary study. In: AIRWeb, pp. 7\u201316 (2005)"},{"key":"18_CR22","unstructured":"Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. In: Exploring AI in the New Millennium (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57529-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:39:27Z","timestamp":1709822367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-57529-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319575285","9783319575292"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57529-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"23 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/pakdd2017.snu.ac.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}