{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:37:34Z","timestamp":1725892654681},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_24","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T13:11:01Z","timestamp":1363180261000},"page":"239-249","source":"Crossref","is-referenced-by-count":2,"title":["PhishLive: A View of Phishing and Malware Attacks from an Edge Router"],"prefix":"10.1007","author":[{"given":"Lianjie","family":"Cao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thibaut","family":"Probst","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ramana","family":"Kompella","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: An empirical study of the effectiveness of web browser phishing warnings. In: CHI, 1065\u20131074 (April 2008)"},{"key":"24_CR2","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding phish: Evaluating Anti-Phishing tools. In: NDSS (February 2007)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R., Gupta, M.: Phishnet: Predictive blacklisting to detect phishing attacks. In: INFOCOM, pp. 1\u20135 (March 2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: Learning to detect malicious web sites from suspicious URLs. In: KDD, pp. 1245\u20131254 (June 2009)","DOI":"10.1145\/1557019.1557153"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: CCS (October 2007)","DOI":"10.1145\/1315245.1315288"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: WORM, 1\u20138 (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: A content-based approach to detecting phishing web sites. In: WWW, pp. 639\u2013648 (May 2007)","DOI":"10.1145\/1242572.1242659"},{"key":"24_CR8","unstructured":"Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C.: A view on current malware behaviors. In: LEET, pp. 1\u201311 (April 2009)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., et al.: Sandnet: network traffic analysis of malicious software. In: BADGERS (April 2011)","DOI":"10.1145\/1978672.1978682"},{"key":"24_CR10","unstructured":"Gu, G., Zhang, J., Wenke, L.: BotSniffer: Detecting botnet command and control channels in network traffic. In: NDSS (February 2008)"},{"key":"24_CR11","unstructured":"Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (April 2010)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Song, C., Zhuge, J., Han, X., Ye, Z.: Preventing drive-by download via inter-module communication monitoring. In: ASIACCS, pp. 124\u2013134 (April 2010)","DOI":"10.1145\/1755688.1755705"},{"key":"24_CR13","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS (February 2010)"},{"key":"24_CR14","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: IEEE S&P Conference (Oakland), pp. 1\u201315 (May 2008)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-22424-9_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"G. Maier","year":"2011","unstructured":"Maier, G., Feldmann, A., Paxson, V., Sommer, R., Vallentin, M.: An Assessment of Overt Malicious Activity Manifest in Residential Networks. In: Holz, T., Bos, H. (eds.) DIMVA 2011. LNCS, vol.\u00a06739, pp. 144\u2013163. Springer, Heidelberg (2011)"},{"key":"24_CR16","unstructured":"Google safe browsing API, \n                    \n                      https:\/\/developers.google.com\/safe-browsing\/"},{"key":"24_CR17","unstructured":"Webb, S., Caverlee, J., Pu, C.: Introducing the webb spam corpus: Using email spam to identify web spam automatically. In: CEAS (July 2006)"},{"key":"24_CR18","unstructured":"Webb, S., Caverlee, J., Pu, C.: Characterizing web spam using content and http session analysis. In: CEAS (July 2007)"},{"key":"24_CR19","unstructured":"Lee, S., Kim, J.: Warningbird: Detecting suspicious URLs in twitter stream. In: NDSS, pp. 1\u201313 (February 2012)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-00975-4_22","volume-title":"Passive and Active Network Measurement","author":"M. Konte","year":"2009","unstructured":"Konte, M., Feamster, N., Jung, J.: Dynamics of Online Scam Hosting Infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 219\u2013228. Springer, Heidelberg (2009)"},{"key":"24_CR21","unstructured":"Holz, T., Gorecki, C., Rieck, K., Freiling, F.: Measuring and detecting fast-flux service networks. In: NDSS (February 2008)"},{"key":"24_CR22","unstructured":"Bhargrava, K., Brewer, D., Li, K.: A study of URL redirection indicating spam. In: CEAS (July 2009)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T19:08:58Z","timestamp":1557601738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}