{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:56:54Z","timestamp":1743094614950,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_8","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"91-103","source":"Crossref","is-referenced-by-count":1,"title":["iCrawl: A Visual High Interaction Web Crawler"],"prefix":"10.1007","author":[{"given":"Deeraj","family":"Nagothu","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Dolgikh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"8_CR1","unstructured":"Symantec: Internet Security Threat Report (2016). https:\/\/www.symantec.com\/security-center\/threat-report . Accessed 3 Nov 2016"},{"key":"8_CR2","unstructured":"Garnaeva, M., Wiel, J.V.D., Makrushin, D., Ivanov, A., Namestnikov, Y.: Kaspersky Security Bulletin, Overall Statistics for 2015. https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/73038\/kaspersky-security-bulletin-2015-overall-statistics-for-2015\/ . Accessed 3 Nov 2016 (2015)"},{"issue":"5","key":"8_CR3","doi-asserted-by":"crossref","first-page":"195","DOI":"10.14257\/ijunesst.2015.8.5.18","volume":"8","author":"DR Patil","year":"2015","unstructured":"Patil, D.R., Patil, J.B.: Survey on malicious web pages detection techniques. Int. J. u- e- Serv. Sci. Technol. 8(5), 195\u2013206 (2015)","journal-title":"Int. J. u- e- Serv. Sci. Technol."},{"key":"8_CR4","unstructured":"U.S federal Government: Digital Analytics program. https:\/\/analytics.usa.gov\/ . Accessed May 2017"},{"key":"8_CR5","volume-title":"Graph Databases","author":"T Robinson","year":"2013","unstructured":"Robinson, T., Webber, J., Eifrem, E.: Graph Databases. O\u2019Reilly Media, Sebastopol (2013)"},{"key":"8_CR6","unstructured":"Neo4j: What is Graph Database? https:\/\/neo4j.com\/developer\/graph-database\/ . Accessed 13 Nov 2016"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Vicknair, C., et al.: A Comaprison of Graph Database and a Relational Database (2009)","DOI":"10.1145\/1900008.1900067"},{"key":"8_CR8","unstructured":"Selenium, Selenium WebDriver (2012). http:\/\/www.seleniumhq.org\/projects\/webdriver\/ . Accessed 18 Nov 2016"},{"key":"8_CR9","unstructured":"Richardson, L.: Beautiful Soup (2004). https:\/\/www.crummy.com\/software\/BeautifulSoup\/ . Accessed 18 Nov 2016"},{"key":"8_CR10","unstructured":"Rodola, G.: Psutils (2009). https:\/\/github.com\/giampaolo\/psutil . Accessed 19 Nov 2016"},{"key":"8_CR11","unstructured":"Small, N.: Py2neo v3 (2011). https:\/\/github.com\/nigelsmall\/py2neo . Accessed 19 Nov 2016"},{"key":"8_CR12","unstructured":"Wang, Y.M., et al: Automated web patrol with strider HoneyMonkeys: finding web sites that exploit browser vulnerabilities. In: 13th Annual Symposium on Network and Distributed System, San Diego, California, USA (2006)"},{"key":"8_CR13","unstructured":"Anagnostakis, K.G., et al.: Detecting targeted attacks using shadow honeypots. In: USENIX Security Symposium (2005)"},{"key":"8_CR14","unstructured":"Dell\u2019Aera, A.: Thug, Github (2011). https:\/\/github.com\/buffer\/thug . Accessed 12 Nov 2016"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:13Z","timestamp":1569967993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}