{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T13:16:44Z","timestamp":1648819004441},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,2,19]],"date-time":"2015-02-19T00:00:00Z","timestamp":1424304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11416-015-0239-x","type":"journal-article","created":{"date-parts":[[2015,2,18]],"date-time":"2015-02-18T03:02:44Z","timestamp":1424228564000},"page":"37-47","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A practical approach for clustering large data flows of malicious URLs"],"prefix":"10.1007","volume":"12","author":[{"given":"Adrian-\u015etefan","family":"Popescu","sequence":"first","affiliation":[]},{"given":"Drago\u015f-Teodor","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]},{"given":"Daniel-Ionu\u0163","family":"Irimia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,19]]},"reference":[{"key":"239_CR1","unstructured":"AV-Test: AV-test GMBH. http:\/\/www.av-test.org\/en\/statistics\/malware\/ . Accessed 10 July 2014"},{"key":"239_CR2","unstructured":"Rajab, M.A., Ballard, L., Navrommatis, M., Panayiotis, N., Google Inc.: CAMP: content-agnostic malware protection. In: Proceedings of 20th Annual Network and Distributed System Security Symposium (2013)"},{"key":"239_CR3","unstructured":"Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proceedings of the 19th USENIX Security Symposium (2010)"},{"key":"239_CR4","unstructured":"Pelleg, D., Moore, A.: X-means: extending K-means with efficient estimation of the number of clusters. In: Proceeding of the 17th International Conference on Machine Learning (2000)"},{"key":"239_CR5","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Exposure: finding malicious domains using passive DNS analysis. In: Proceeding of the 18th Annual Network and Distributed System Security Symposium (2011)"},{"key":"239_CR6","doi-asserted-by":"crossref","unstructured":"Salzberg, S.L.: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Mach. Learn. 16(3), 235\u2013240 (1994)","DOI":"10.1007\/BF00993309"},{"key":"239_CR7","unstructured":"Alexa Web Information Company: http:\/\/www.alexa.com\/topsites . Accessed 10 July 2014"},{"key":"239_CR8","unstructured":"VirusTotal: http:\/\/www.virustotal.com\/ . Accessed 10 July 2014"},{"key":"239_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm. In: Technical report, MIT Laboratory for Computer Science and RSA Data Security Inc, vol. 4, RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"239_CR10","doi-asserted-by":"crossref","unstructured":"Anton, D., Gavrilu\u0163, D., Cimpoe\u015fu, M., Ciortuz, L.: Malware detection using machine learning. In: International Multiconference on Computer Science and Information Technology, pp. 735\u2013741 (2009)","DOI":"10.1109\/IMCSIT.2009.5352759"},{"issue":"4","key":"239_CR11","first-page":"133","volume":"8","author":"D Gavrilu\u0163","year":"2008","unstructured":"Gavrilu\u0163, D., Cimpoe\u015fu, M., Popescu, Adrian: The proactivity of perceptron derived algorithms in malware detection. J. Comput. Virol. 8(4), 133\u2013140 (2008)","journal-title":"J. Comput. Virol."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0239-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-015-0239-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0239-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T21:35:58Z","timestamp":1566336958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-015-0239-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,19]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["239"],"URL":"https:\/\/doi.org\/10.1007\/s11416-015-0239-x","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,19]]}}}