{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:48:11Z","timestamp":1743007691420,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819755745"},{"type":"electronic","value":"9789819755752"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5575-2_22","type":"book-chapter","created":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T10:01:54Z","timestamp":1725184914000},"page":"300-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Novel UGA Homologous URL Recognition in Real-World Financial Cybercrimes: Self-supervised Deep Learning of URL Semantics"],"prefix":"10.1007","author":[{"given":"Guolin","family":"Shao","sequence":"first","affiliation":[]},{"given":"Zeshui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaoxi","family":"He","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Aljabri, M., Alhaidari, F., Mohammad, R.M.A., Mirza, S., Alhamed, D.H., Altamimi, H.S., Chrouf, S.M., et\u00a0al.: An assessment of lexical, network, and content-based features for detecting malicious urls using machine learning and deep learning models. Computational Intelligence and Neuroscience 2022 (2022)","DOI":"10.1155\/2022\/3241216"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Aljabri, M., Mirza, S.: Phishing attacks detection using machine learning and deep learning models. In: 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA). pp. 175\u2013180. IEEE (2022)","DOI":"10.1109\/CDMA54072.2022.00034"},{"key":"22_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119103","volume":"214","author":"N B\u00f6l\u00fcc\u00fc","year":"2023","unstructured":"B\u00f6l\u00fcc\u00fc, N., Can, B., Artuner, H.: A siamese neural network for learning semantically-informed sentence embeddings. Expert Syst. Appl. 214, 119103 (2023)","journal-title":"Expert Syst. Appl."},{"key":"22_CR4","unstructured":"Chen, Z., Badrinarayanan, V., Lee, C.Y., Rabinovich, A.: Gradnorm: Gradient normalization for adaptive loss balancing in deep multitask networks. In: International conference on machine learning. pp. 794\u2013803. PMLR (2018)"},{"key":"22_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114551","volume":"170","author":"A Cucchiarelli","year":"2021","unstructured":"Cucchiarelli, A., Morbidoni, C., Spalazzi, L., Baldi, M.: Algorithmically generated malicious domain names detection based on n-grams features. Expert Syst. Appl. 170, 114551 (2021)","journal-title":"Expert Syst. Appl."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Dasgupta, A., Kumar, R., Sasturkar, A.: De-duping urls via rewrite rules. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining. pp. 186\u2013194 (2008)","DOI":"10.1145\/1401890.1401917"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Ding, Y., Luktarhan, N., Li, K., Slamu, W.: A keyword-based combination approach for detecting phishing webpages. computers & security 84, 256\u2013275 (2019)","DOI":"10.1016\/j.cose.2019.03.018"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Gu, X., Chen, X., Lu, P., Lan, X., Li, X., Du, Y.: Simalstm-snp: novel semantic relatedness learning model preserving both siamese networks and membrane computing. The Journal of Supercomputing pp. 1\u201330 (2023)","DOI":"10.1007\/s11227-023-05592-7"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Hong, J., Kim, T., Liu, J., Park, N., Kim, S.W.: Phishing url detection with lexical features and blacklisted domains. Adaptive autonomous secure cyber systems pp. 253\u2013267 (2020)","DOI":"10.1007\/978-3-030-33432-1_12"},{"key":"22_CR10","unstructured":"Jensen, \u00d8., Shalaginov, A., Dyrkolbotn, G.O.: Study of blacklisted malicious domains from a microsoft windows end-user perspective: Is it safe behind the wall? In: Norsk IKT-konferanse for forskning og utdanning. No.\u00a03 (2020)"},{"issue":"11","key":"22_CR11","doi-asserted-by":"publisher","first-page":"9168","DOI":"10.1007\/s11227-020-03206-0","volume":"76","author":"M Kayed","year":"2020","unstructured":"Kayed, M., Elngar, A.A.: Nestmsa: a new multiple sequence alignment algorithm. J. Supercomput. 76(11), 9168\u20139188 (2020)","journal-title":"J. Supercomput."},{"key":"22_CR12","unstructured":"LE, H., PHAM, H.Q., SAHOO, D., HOI, S.C.: Urlnet: Learning a url representation with deep learning for malicious url detection.(2017). In: PODS 2017: Proceedings of the ACM Symposium on Principles of Distributed Computing, Washington, DC, July 25. vol.\u00a027, pp. 1\u201313"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Maneriker, P., Stokes, J.W., Lazo, E.G., Carutasu, D., Tajaddodianfar, F., Gururajan, A.: Urltran: Improving phishing url detection using transformers. In: MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). pp. 197\u2013204. IEEE (2021)","DOI":"10.1109\/MILCOM52596.2021.9653028"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Manjeri, A.S., Kaushik, R., Ajay, M., Nair, P.C.: A machine learning approach for detecting malicious websites using url features. In: 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). pp. 555\u2013561. IEEE (2019)","DOI":"10.1109\/ICECA.2019.8821879"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.procs.2020.04.071","volume":"171","author":"G Palaniappan","year":"2020","unstructured":"Palaniappan, G., Sangeetha, S., Rajendran, B., Goyal, S., Bindhumadhava, B., et al.: Malicious domain detection using machine learning on domain name features, host-based features and web-based features. Procedia Computer Science 171, 654\u2013661 (2020)","journal-title":"Procedia Computer Science"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Rane, P.S., Dalal, M.: iduster: Improved method for removing dust based on efficient multiple sequence alignment technique. In: 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). pp. 1450\u20131454. IEEE (2018)","DOI":"10.1109\/ICIRCA.2018.8597326"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-bert: Sentence embeddings using siamese bert-networks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). pp. 3982\u20133992 (2019)","DOI":"10.18653\/v1\/D19-1410"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Xu, K., Liu, Z., Callan, J.: De-duping urls with sequence-to-sequence neural networks. In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. pp. 1157\u20131160 (2017)","DOI":"10.1145\/3077136.3080746"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhang, L., Liu, G., Chen, E.: Upca: an efficient url-pattern based algorithm for accurate web page classification. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). pp. 1475\u20131480. IEEE (2015)","DOI":"10.1109\/FSKD.2015.7382162"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5575-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T16:44:16Z","timestamp":1732725856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5575-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755745","9789819755752"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5575-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gifu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dasfaa2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}