{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:37:25Z","timestamp":1761597445122},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,8,10]],"date-time":"2013-08-10T00:00:00Z","timestamp":1376092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11280-013-0250-4","type":"journal-article","created":{"date-parts":[[2013,8,9]],"date-time":"2013-08-09T07:57:40Z","timestamp":1376035060000},"page":"1375-1394","source":"Crossref","is-referenced-by-count":33,"title":["Malicious URL detection by dynamically mining patterns without pre-defined elements"],"prefix":"10.1007","volume":"17","author":[{"given":"Da","family":"Huang","sequence":"first","affiliation":[]},{"given":"Kai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,10]]},"reference":[{"key":"250_CR1","first-page":"39","volume-title":"Proceedings of the Seventh International Symposium on String Processing Information Retrieval (SPIRE\u201900)","author":"L Bergroth","year":"2000","unstructured":"Bergroth, L., Hakonen, H., Raita, T.: A survey of longest common subsequence algorithms. In: Proceedings of the Seventh International Symposium on String Processing Information Retrieval (SPIRE\u201900), pp.\u00a039\u201348. IEEE Computer Society, Washington, DC, USA (2000)"},{"key":"250_CR2","doi-asserted-by":"crossref","unstructured":"Dredze, M., Crammer, K.: Confidence-weighted linear classification. In: ICML \u201908: Proceedings of the 25th International Conference on Machine Learning, pp.\u00a0264\u2013271. ACM (2008)","DOI":"10.1145\/1390156.1390190"},{"key":"250_CR3","unstructured":"Fortinet: Fortinet web filtering. http:\/\/www.fortiguard.com\/webfiltering\/webfiltering.html . Accessed 12 Mar 2012"},{"key":"250_CR4","unstructured":"Gartner: Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks. http:\/\/www.gartner.com\/it\/page.jsp?id=565125 . Accessed 12 Mar 2012"},{"key":"250_CR5","unstructured":"ICT Applications and Cybersecurity Division, Policies and Strategies Department, and ITU Telecommunication Development Sector: ITU study on the financial aspects of network security: malware and spam. http:\/\/www.itu.int\/ITU-D\/cyb\/cybersecurity\/docs\/itu-study-financial-aspects-of-malware-and-spam.pdf . Accessed 12 Mar 2012"},{"key":"250_CR6","first-page":"325","volume-title":"Proceedings of the 14th ACM International Conference on Information and Knowledge Management. CIKM\u00a0\u201905","author":"M-Y Kan","year":"2005","unstructured":"Kan, M.-Y., Thi, H.O.N.: Fast webpage classification using url features. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management. CIKM\u00a0\u201905, pp.\u00a0325\u2013326. ACM, New York, NY, USA (2005)"},{"key":"250_CR7","volume-title":"Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies","author":"A Le","year":"2011","unstructured":"Le, A., Markopoulou, A., Faloutsos, M.: Phishdef: url names say it all. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, pp.\u00a0191\u2013195. IEEE, Shanghai, China (2011)"},{"key":"250_CR8","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1145\/1557019.1557153","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD\u00a0\u201909","author":"J Ma","year":"2009","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD\u00a0\u201909, pp.\u00a01245\u20131254. ACM, New York, NY, USA (2009)"},{"issue":"2","key":"250_CR9","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/322063.322075","volume":"25","author":"D Maier","year":"1978","unstructured":"Maier, D.: The complexity of some problems on subsequences and supersequences. J. ACM 25(2), 322\u2013336 (1978)","journal-title":"J. ACM"},{"key":"250_CR10","first-page":"4:1","volume-title":"Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats","author":"DK McGrath","year":"2008","unstructured":"McGrath, D.K., Gupta, M.: Behind phishing: an examination of phisher modi operandi. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp.\u00a04:1\u20134:8. USENIX Association, Berkeley, CA, USA (2008)"},{"key":"250_CR11","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201906)","author":"A Moshchuk","year":"2006","unstructured":"Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A crawler-based study of spyware in the web. In: Proceedings of the Network and Distributed System Security Symposium (NDSS\u201906). The Internet Society, San Diego, California, USA (2006)"},{"key":"250_CR12","unstructured":"Netcraft: Netcraft. http:\/\/news.netcraft.com\/ . Accessed 12 Mar 2012"},{"key":"250_CR13","unstructured":"PhishTank: Phishtank. http:\/\/www.phishtank.com\/ . Accessed 12 Mar 2012"},{"key":"250_CR14","first-page":"1","volume-title":"Proceedings of the 17th Conference on Security Symposium","author":"N Provos","year":"2008","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: Proceedings of the 17th Conference on Security Symposium, pp.\u00a01\u201315. USENIX Association, Berkeley, CA, USA (2008)"},{"key":"250_CR15","unstructured":"Wikipedia: Web threat. http:\/\/en.wikipedia.org\/wiki\/Web_threat . Accessed 12 Mar 2012"},{"key":"250_CR16","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1879141.1879148","volume-title":"Proceedings of the 10th Annual Conference on Internet Measurement. IMC \u201910","author":"S Yadav","year":"2010","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th Annual Conference on Internet Measurement. IMC \u201910, pp. 48\u201361. ACM, New York, NY, USA (2010)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-013-0250-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-013-0250-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-013-0250-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T18:31:08Z","timestamp":1563647468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-013-0250-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,10]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s11280-013-0250-4","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,10]]}}}