{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:51:25Z","timestamp":1770468685635,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T00:00:00Z","timestamp":1707264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T00:00:00Z","timestamp":1707264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00512-6","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T06:02:20Z","timestamp":1707285740000},"page":"565-577","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["\u201cDirclustering\u201d: a semantic clustering approach to optimize website structure discovery during penetration testing"],"prefix":"10.1007","volume":"20","author":[{"given":"Diego","family":"Antonelli","sequence":"first","affiliation":[]},{"given":"Roberta","family":"Cascella","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Schiano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8238-6426","authenticated-orcid":false,"given":"Gaetano","family":"Perrone","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-0382","authenticated-orcid":false,"given":"Simon Pietro","family":"Romano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,7]]},"reference":[{"key":"512_CR1","unstructured":"Williams, J.: The OWASP project (ed.) (no date) Testing guide 4 - OWASP. https:\/\/owasp.org\/www-project-web-security-testing-guide\/assets\/archive\/OWASP_Testing_Guide_v4.pdf. Accessed 04 Feb 2024"},{"issue":"5","key":"512_CR2","doi-asserted-by":"publisher","first-page":"115","DOI":"10.25046\/aj040515","volume":"4","author":"R Ibrahim","year":"2019","unstructured":"Ibrahim, R., Zeebaree, S., Jacksi, K.: Survey on semantic similarity based on document clustering. Adv. Sci. Technol. Eng. Syst. J 4(5), 115\u2013122 (2019)","journal-title":"Adv. Sci. Technol. Eng. Syst. J"},{"key":"512_CR3","doi-asserted-by":"crossref","unstructured":"Naik, M.P., Prajapati, H.B., Dabhi, V.K.: A survey on semantic document clustering. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1\u201310 (2015). IEEE","DOI":"10.1109\/ICECCT.2015.7226036"},{"key":"512_CR4","doi-asserted-by":"crossref","unstructured":"Fellbaum, C.: Wordnet. The encyclopedia of applied linguistics. Chichester, England: Wiley-Blackwel (2012)","DOI":"10.1002\/9781405198431.wbeal1285"},{"key":"512_CR5","unstructured":"mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"512_CR6","first-page":"3111","volume":"26","author":"T Mikolov","year":"2013","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. Adv. Neural Inf. Process. Syst. 26, 3111\u20133119 (2013)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"512_CR7","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: Global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"512_CR8","first-page":"1188","volume":"32","author":"Q Le","year":"2014","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. Int. Conf. Mach. Learn. 32, 1188\u20131196 (2014)","journal-title":"Int. Conf. Mach. Learn."},{"key":"512_CR9","doi-asserted-by":"crossref","unstructured":"Cer, D., Yang, Y., Kong, S.-y., Hua, N., Limtiaco, N., John, R.S., Constant, N., Guajardo-Cespedes, M., Yuan, S., Tar, C., et al.: Universal sentence encoder. arXiv preprint arXiv:1803.11175 (2018)","DOI":"10.18653\/v1\/D18-2029"},{"key":"512_CR10","doi-asserted-by":"crossref","unstructured":"Conneau, A., Kiela, D., Schwenk, H., Barrault, L., Bordes, A.: Supervised learning of universal sentence representations from natural language inference data. arXiv preprint arXiv:1705.02364 (2017)","DOI":"10.18653\/v1\/D17-1070"},{"key":"512_CR11","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"512_CR12","doi-asserted-by":"publisher","unstructured":"Cer, D., Diab, M., Agirre, E., Lopez-Gazpio, I., Specia, L.: SemEval-2017 task 1: Semantic textual similarity multilingual and crosslingual focused evaluation. In: Proceedings of the 11th International Workshop on Semantic Evaluation (SemEval-2017), pp. 1\u201314. Association for Computational Linguistics, Vancouver, Canada (2017). https:\/\/doi.org\/10.18653\/v1\/S17-2001 . https:\/\/www.aclweb.org\/anthology\/S17-2001","DOI":"10.18653\/v1\/S17-2001"},{"issue":"8","key":"512_CR13","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recognit. Lett. 31(8), 651\u2013666 (2010)","journal-title":"Pattern Recognit. Lett."},{"issue":"5","key":"512_CR14","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/tkde.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631\u2013645 (2007). https:\/\/doi.org\/10.1109\/tkde.2007.1009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"512_CR15","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.052213.00046","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1145\/1541880","key":"512_CR16","first-page":"1541882","volume":"10","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 10(1145\/1541880), 1541882 (2009)","journal-title":"ACM Comput. Surv."},{"key":"512_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2015.11.016","journal-title":"J. Netw. Comput. Appl."},{"key":"512_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3439950","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (2021). https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput. Surv."},{"key":"512_CR19","doi-asserted-by":"publisher","first-page":"6249","DOI":"10.1109\/ACCESS.2019.2963724","volume":"8","author":"A Aslan","year":"2020","unstructured":"Aslan, A., Samet, R.: A comprehensive review on malware detection approaches. IEEE Access 8, 6249\u20136271 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2963724","journal-title":"IEEE Access"},{"key":"512_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/3073559","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. (2017). https:\/\/doi.org\/10.1145\/3073559","journal-title":"ACM Comput. Surv."},{"key":"512_CR21","doi-asserted-by":"publisher","DOI":"10.1145\/3417978","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of android malware detection with deep neural models. ACM Comput. Surv. (2020). https:\/\/doi.org\/10.1145\/3417978","journal-title":"ACM Comput. Surv."},{"key":"512_CR22","doi-asserted-by":"publisher","unstructured":"Deore, M., Kulkarni, U.: Mdfrcnn: malware detection using faster region proposals convolution neural network. Int. J. Interact. Multimed. Artif. Intell. 7(4), 146 (2022). https:\/\/doi.org\/10.9781\/ijimai.2021.09.005","DOI":"10.9781\/ijimai.2021.09.005"},{"key":"512_CR23","doi-asserted-by":"crossref","unstructured":"Karbab, E.B., Debbabi, M.: Maldy: portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digital Invest. 28, 77\u201387 (2019)","DOI":"10.1016\/j.diin.2019.01.017"},{"key":"512_CR24","doi-asserted-by":"crossref","unstructured":"Malhotra, R., Chug, A., Hayrapetian, A., Raje, R.: Analyzing and evaluating security features in software requirements. In: 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 26\u201330 (2016). IEEE","DOI":"10.1109\/ICICCS.2016.7542334"},{"key":"512_CR25","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Peleg, H., Singh, R.: Learn &fuzz: Machine learning for input fuzzing. In: 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 50\u201359 (2017). IEEE","DOI":"10.1109\/ASE.2017.8115618"},{"key":"512_CR26","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., Perez-Cruz, F.: Passgan: A deep learning approach for password guessing. In: International Conference on Applied Cryptography and Network Security, pp. 217\u2013237 (2019). Springer","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"512_CR27","doi-asserted-by":"crossref","unstructured":"Nourashrafeddin, S., Milios, E., Arnold, D.V.: An ensemble approach for text document clustering using wikipedia concepts. In: Proceedings of the 2014 ACM Symposium on Document Engineering, pp. 107\u2013116 (2014)","DOI":"10.1145\/2644866.2644868"},{"key":"512_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2017.02.009","volume":"393","author":"Z Wu","year":"2017","unstructured":"Wu, Z., Zhu, H., Li, G., Cui, Z., Huang, H., Li, J., Chen, E., Xu, G.: An efficient Wikipedia semantic matching approach to text document classification. Inf. Sci. 393, 15\u201328 (2017)","journal-title":"Inf. Sci."},{"key":"512_CR29","doi-asserted-by":"crossref","unstructured":"Desai, S.S., Laxminarayana, J.: Wordnet and semantic similarity based approach for document clustering. In: 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp. 312\u2013317 (2016). IEEE","DOI":"10.1109\/CSITSS.2016.7779377"},{"key":"512_CR30","doi-asserted-by":"crossref","unstructured":"Sahni, L., Sehgal, A., Kochar, S., Ahmad, F., Ahmad, T.: A novel approach to find semantic similarity measure between words. In: 2014 2nd International Symposium on Computational and Business Intelligence, pp. 89\u201392 (2014). IEEE","DOI":"10.1109\/ISCBI.2014.26"},{"issue":"4","key":"512_CR31","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1016\/j.eswa.2014.10.023","volume":"42","author":"T Wei","year":"2015","unstructured":"Wei, T., Lu, Y., Chang, H., Zhou, Q., Bao, X.: A semantic approach for text clustering using wordnet and lexical chains. Expert Syst. Appl. 42(4), 2264\u20132275 (2015)","journal-title":"Expert Syst. Appl."},{"key":"512_CR32","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.knosys.2016.08.008","volume":"111","author":"N Fiorini","year":"2016","unstructured":"Fiorini, N., Harispe, S., Ranwez, S., Montmain, J., Ranwez, V.: Fast and reliable inference of semantic clusters. Knowl. Based Syst. 111, 133\u2013143 (2016)","journal-title":"Knowl. Based Syst."},{"key":"512_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, J., Wang, C.: Automatic synonym extraction using word2vec and spectral clustering. In: 2017 36th Chinese Control Conference (CCC), pp. 5629\u20135632 (2017). IEEE","DOI":"10.23919\/ChiCC.2017.8028251"},{"key":"512_CR34","doi-asserted-by":"crossref","unstructured":"Li, C., Lu, Y., Wu, J., Zhang, Y., Xia, Z., Wang, T., Yu, D., Chen, X., Liu, P., Guo, J.: Lda meets word2vec: a novel model for academic abstract clustering. In: Companion Proceedings of the The Web Conference 2018, pp. 1699\u20131706 (2018)","DOI":"10.1145\/3184558.3191629"},{"key":"512_CR35","doi-asserted-by":"crossref","unstructured":"Alshari, E.M., Azman, A., Doraisamy, S., Mustapha, N., Alkeshr, M.: Improvement of sentiment analysis based on clustering of word2vec features. In: 2017 28th International Workshop on Database and Expert Systems Applications (DEXA), pp. 123\u2013126 (2017). IEEE","DOI":"10.1109\/DEXA.2017.41"},{"key":"512_CR36","unstructured":"Karagkiozis, N.: Clustering Semantically Related Questions \u00d6rebro University, School of Science and Technology. (2019)"},{"key":"512_CR37","unstructured":"Asgari-Chenaghlu, M., Nikzad-Khasmakhi, N., Minaee, S.: Covid-transformer: Detecting trending topics on twitter using universal sentence encoder. arXiv preprint arXiv:2009.03947 (2020)"},{"key":"512_CR38","doi-asserted-by":"crossref","unstructured":"Bodrunova, S.S., Orekhov, A.V., Blekanov, I.S., Lyudkevich, N.S., Tarasov, N.A.: Topic detection based on sentence embeddings and agglomerative clustering with Markov moment. Future Internet 12(9), 144 (2020)","DOI":"10.3390\/fi12090144"},{"key":"512_CR39","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man\u00e9, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi\u00e9gas, F., Vinyals, O.,Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: large-scale machine learning on heterogeneous systems. Software available from tensorflow.org (2015). https:\/\/www.tensorflow.org\/"},{"key":"512_CR40","unstructured":"Corporation, M.: CWE-552: Files or directories accessible to external parties. https:\/\/cwe.mitre.org\/data\/definitions\/552.html (2023)"},{"key":"512_CR41","unstructured":"Corporation, M.: CAPEC-143: Detect unpublicized web pages. https:\/\/capec.mitre.org\/data\/definitions\/143.html (2023)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00512-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00512-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00512-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:07:22Z","timestamp":1729004842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00512-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,7]]},"references-count":41,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["512"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00512-6","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,7]]},"assertion":[{"value":"12 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}