{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:28:17Z","timestamp":1758274097839},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_13","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"129-137","source":"Crossref","is-referenced-by-count":5,"title":["Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines"],"prefix":"10.1007","author":[{"given":"Prabaharan","family":"Poornachandran","sequence":"first","affiliation":[]},{"given":"S.","family":"Praveen","sequence":"additional","affiliation":[]},{"given":"Aravind","family":"Ashok","sequence":"additional","affiliation":[]},{"given":"Manu R.","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Soman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"M. Egele et al., Defending browsers against drive-by downloads: mitigating heap-spraying code injection attacks, in Detection of Intrusions and Malware, and Vulnerability Assessment. (Springer, Berlin, Heidelberg, 2009), pp. 88\u2212106","DOI":"10.1007\/978-3-642-02918-9_6"},{"key":"13_CR2","unstructured":"N. Provos et al., The ghost in the browser: analysis of web-based malware. HotBots, 7, 4\u20134 (2007)"},{"key":"13_CR3","unstructured":"C. Seifert et al., Know your enemy. Malicious web servers. The Honeynet Project (2007)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"M. Cova, K. Christopher, V. Giovanni, Detection and analysis of drive-by-download attacks and malicious JavaScript code, in Proceedings of the 19th International Conference on World Wide Web (ACM, 2010)","DOI":"10.1145\/1772690.1772720"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"K. Rieck, K.T. Krueger, A. Dewald. Cujo: efficient detection and prevention of drive-by-download attacks in Proceedings of the 26th Annual Computer Security Applications Conference (ACM, 2010)","DOI":"10.1145\/1920261.1920267"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"L. Lu et al., Blade: an attack-agnostic approach for preventing drive-by malware infections, in Proceedings of the 17th ACM Conference on Computer and Communications Security, (ACM, 2010)","DOI":"10.1145\/1866307.1866356"},{"key":"13_CR7","unstructured":"N.P.P. Mavrommatis, M.A.R.F. Monrose, All your iframes point to us in USENIX Security Symposium (2008)"},{"key":"13_CR8","unstructured":"A. Moshchuk et al., A Crawler-based Study of Spyware in the Web, in NDSS vol. 1 (2006)"},{"key":"13_CR9","unstructured":"A. Ikinci, T. Holz, F.C. Freiling, Monkey-Spider: detecting Malicious Websites with Low-Interaction Honeyclients, in Sicherheit vol. 8 (2008)"},{"key":"13_CR10","unstructured":"N. Provos, SpyBye\u2014Finding Malware (2016), http:\/\/www.monkey.org\/~provos\/spybye Accessed 15 June 2016"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"H. Kim, J. Smith, K.G. Shin, Detecting energy-greedy anomalies and mobile malware variants, in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (ACM, 2008)","DOI":"10.1145\/1378600.1378627"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"J. Flinn, M. Satyanarayanan, Powerscope: A tool for profiling the energy usage of mobile applications. Mobile computing systems and applications, in Proceedings Second IEEE Workshop on WMCSA\u201999 (IEEE, 1999)","DOI":"10.1109\/MCSA.1999.749272"},{"key":"13_CR13","unstructured":"L. Lei et al., Virusmeter: preventing your cellphone from spies in Recent Advances in Intrusion Detection (Springer, Berlin, Heidelberg, 2009)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"L. Zhang et al., Accurate online power estimation and automatic battery behavior based power model generation for smartphones. in Proceedings of the Eighth IEEE\/ACM\/IFIP International Conference on Hardware\/Software Codesign and System Synthesi (ACM, 2010)","DOI":"10.1145\/1878961.1878982"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"S. Kim et al., Accelerating full-system simulation through characterizing and predicting operating system performance, in 2007 IEEE International Symposium on Performance Analysis of Systems & Software, ISPASS (IEEE, 2007)","DOI":"10.1109\/ISPASS.2007.363731"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"S. Rui et al., The relationship research between usage of resource and performance of computer system, in WRI World Congress on Software Engineering, 2009 WCSE\u201909, vol. 3 (IEEE, 2009)","DOI":"10.1109\/WCSE.2009.169"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"J. Kreku et al., Combining UML2 application and SystemC platform modelling for performance evaluation of real-time embedded systems. EURASIP J. Embed. Syst. 1, 1\u201318 (2008)","DOI":"10.1155\/2008\/712329"},{"key":"13_CR18","unstructured":"K.P. Soman, R. Loganathan, V. Ajay, Machine Learning with Svm and Other Kernel Methods (PHI Learning Pvt. Ltd, 2009)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"R. Perdisci, G. Gu, W. Lee, Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems, in Sixth International Conference on Data Mining ICDM\u201906 (IEEE, 2006)","DOI":"10.1109\/ICDM.2006.165"},{"key":"13_CR20","unstructured":"DM. Powers, Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T03:00:40Z","timestamp":1568862040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}