{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:41:04Z","timestamp":1763142064263,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811978661"},{"type":"electronic","value":"9789811978678"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-7867-8_33","type":"book-chapter","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T12:02:18Z","timestamp":1683288138000},"page":"415-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["URL Classification on Extracted Feature Using Deep Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7601-4837","authenticated-orcid":false,"given":"Vishal Kumar","family":"Sahoo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3052-588X","authenticated-orcid":false,"given":"Vinayak","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1785-8586","authenticated-orcid":false,"given":"Mahendra Kumar","family":"Gourisaria","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1673-3378","authenticated-orcid":false,"given":"Anuja Kumar","family":"Acharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,6]]},"reference":[{"key":"33_CR1","unstructured":"Internet Security Threat Report (ISTR) 2019\u2013Symantec.: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf. Last Accessed 17 Mar 2022"},{"key":"33_CR2","unstructured":"Sahoo, D., Liu, C., Hoi, S.C.: Malicious URL detection using machine learning: a survey (2017). arXiv preprint arXiv:1701.07179"},{"issue":"4","key":"33_CR3","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutorials 15(4), 2091\u20132121 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In\u00a0Proceedings of the 19th International Conference on World Wide Web, pp. 281\u2013290. (2010)","DOI":"10.1145\/1772690.1772720"},{"issue":"3","key":"33_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2835375","volume":"48","author":"R Heartfield","year":"2015","unstructured":"Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48(3), 1\u201339 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R.R., Gupta, M.: Phishnet: predictive blacklisting to detect phishing attacks. In:\u00a02010 Proceedings IEEE INFOCOM, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In:\u00a0Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. 1\u20138. (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Khonji, M., Jones, A., Iraqi, Y.: A study of feature subset evaluators and feature subset searching methods for phishing classification. In:\u00a0Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 135\u2013144. (2011)","DOI":"10.1145\/2030376.2030392"},{"key":"33_CR9","unstructured":"Kuyama, M., Kakizaki, Y., Sasaki, R.: Method for detecting a malicious domain by using whois and dns features. In:\u00a0The Third International Conference on Digital Security and Forensics (DigitalSec2016), vol. 74 (2016)"},{"issue":"3","key":"33_CR10","first-page":"1","volume":"2","author":"J Ma","year":"2011","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Learning to detect malicious urls. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1\u201324 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Singh, V., Gourisaria, M.K., Harshvardhan, G.M., Rautaray, S.S., Pandey, M., Sahni, M., ... Espinoza-Audelo, L.F.: Diagnosis of intracranial tumors via the selective CNN data modeling technique. Appl. Sci. 12(6), 2900 (2022)","DOI":"10.3390\/app12062900"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Das, H., Naik, B., Behera, H.S.: Classification of diabetes mellitus disease (DMD): a data mining (DM) approach. In: Progress in Computing, Analytics and Networking, pp. 539\u2013549. Springer, Singapore (2018)","DOI":"10.1007\/978-981-10-7871-2_52"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Sarah, S., Singh, V., Gourisaria, M.K., Singh, P.K.: Retinal disease detection using CNN through optical coherence tomography images. In 2021 5th International Conference on Information Systems and Computer Networks (ISCON), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/ISCON52037.2021.9702480"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Panigrahi, K.P., Sahoo, A.K., Das, H.: A cnn approach for corn leaves disease detection to support digital agricultural system. In: 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI), vol. 48184, pp. 678\u2013683. IEEE (2020)","DOI":"10.1109\/ICOEI48184.2020.9142871"},{"key":"33_CR15","unstructured":"Chandra, S., Gourisaria, M.K., Harshvardhan, G.M., Rautaray, S.S., Pandey, M., Mohanty, S.N.: Semantic analysis of sentiments through web-mined twitter corpus. In\u00a0CEUR Workshop Proceedings, vol. 2786, pp. 122\u2013135. (2021)"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Pramanik, R., Khare, S., Gourisaria, M.K.: Inferring the occurrence of chronic kidney failure: a data mining solution. In: Gupta, D., Khanna, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds.) Proceedings of Second Doctoral Symposium on Computational Intelligence. Advances in Intelligent Systems and Computing, vol. 1374, Springer, Singapore (2022)","DOI":"10.1007\/978-981-16-3346-1_59"},{"issue":"4","key":"33_CR17","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1587\/transinf.2015ICP0027","volume":"99","author":"B Sun","year":"2016","unstructured":"Sun, B., Akiyama, M., Yagi, T., Hatada, M., Mori, T.: Automating URL blacklist generation with similarity search approach. IEICE Trans. Inf. Syst. 99(4), 873\u2013882 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based \u201cblacklists\u201d. In:\u00a02008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp. 57\u201364. IEEE (2008)","DOI":"10.1109\/MALWARE.2008.4690858"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In:\u00a0Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Vundavalli, V., Barsha, F., Masum, M., Shahriar, H., Haddad, H.: Malicious URL detection using supervised machine learning techniques. In:\u00a013th International Conference on Security of Information and Networks, pp. 1\u20136. (2020)","DOI":"10.1145\/3433174.3433592"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Aydin, M., Butun, I., Bicakci, K., Baykal, N.: Using attribute-based feature selection approaches and machine learning algorithms for detecting fraudulent website URLs. In:\u00a02020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0774\u20130779. IEEE (2020)","DOI":"10.1109\/CCWC47524.2020.9031125"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Bharadwaj, R., Bhatia, A., Chhibbar, L. D., Tiwari, K., Agrawal, A.: Is this url safe: detection of malicious urls using global vector for word representation. In:\u00a02022 International Conference on Information Networking (ICOIN), pp. 486\u2013491. IEEE (2022)","DOI":"10.1109\/ICOIN53446.2022.9687204"},{"key":"33_CR23","unstructured":"https:\/\/www.kaggle.com\/datasets\/siddharthkumar25\/malicious-and-benign-urls. Last Accessed 3 Mar 2022"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Singh, V., Gourisaria, M.K., Das, H.: Performance analysis of machine learning algorithms for prediction of liver disease. In:\u00a02021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/GUCON50781.2021.9573803"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Das, H., Naik, B., Behera, H.S.: Medical disease analysis using neuro-fuzzy with feature extraction model for classification.\u00a0Inform. Med. Unlocked\u00a018, 100288 (2020)","DOI":"10.1016\/j.imu.2019.100288"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Sarah, S., Gourisaria, M.K., Khare, S., Das, H.: Heart disease prediction using core machine learning techniques\u2014a comparative study. In:\u00a0Advances in Data and Information Sciences, pp. 247\u2013260. Springer, Singapore (2022)","DOI":"10.1007\/978-981-16-5689-7_22"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Magesh Kumar, C., Thiyagarajan, R., Natarajan, S.P., Arulselvi, S., Sainarayanan, G.: Gabor features and LDA based face recognition with ANN classifier. In:\u00a02011 International Conference on Emerging Trends in Electrical and Computer Technology, pp. 831\u2013836. IEEE (2011)","DOI":"10.1109\/ICETECT.2011.5760234"},{"key":"33_CR28","unstructured":"Wijoyo, S., Wijoyo, S.: Speech recognition using linear predictive coding and artificial neural network for controlling the movement of a mobile robot. In: Proceedings of the 2011 International Conference on Information and Electronics Engineering (ICIEE 2011), Bangkok, Thailand, pp. 28\u201329. (2011)"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Jain, S., Gupta, R., Moghe, A.A.: Stock price prediction on daily stock data using deep neural networks. In:\u00a02018 International Conference on Advanced Computation and Telecommunication (ICACAT), pp. 1\u201313. IEEE (2018)","DOI":"10.1109\/ICACAT.2018.8933791"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"Visca, M., Bouton, A., Powell, R., Gao, Y., Fallah, S.: Conv1D energy-aware path planner for mobile robots in unstructured environments. In:\u00a02021 IEEE International Conference on Robotics and Automation (ICRA), pp. 2279\u20132285. IEEE (2021)","DOI":"10.1109\/ICRA48506.2021.9560771"},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Kim, T., Lee, J., Nam, J.: Sample-level CNN architectures for music auto-tagging using raw waveforms. In:\u00a02018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 366\u2013370. IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8462046"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Singh, V., Gourisaria, M.K., Harshvardhan, G.M., Singh, V.: Mycobacterium tuberculosis detection using CNN ranking approach. In: Gandhi, T.K., Konar, D., Sen, B., Sharma, K. (eds.) Advanced Computational Paradigms and Hybrid Intelligent Computing. Advances in Intelligent Systems and Computing, vol. 1373. Springer, Singapore (2022)","DOI":"10.1007\/978-981-16-4369-9_56"}],"container-title":["Lecture Notes in Networks and Systems","Computer Vision and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-7867-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T12:07:25Z","timestamp":1683288445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-7867-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811978661","9789811978678"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-7867-8_33","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"6 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}