{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:52:37Z","timestamp":1730195557255,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/aiccsa.2018.8612855","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T01:26:29Z","timestamp":1547774789000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Hess","sequence":"first","affiliation":[]},{"given":"Pratik","family":"Satam","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Ditzler","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Classi-fication and regression trees","year":"1984","author":"breiman","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-59119-2_166","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","author":"freund","year":"1995","journal-title":"European Conf on Computational Learning Theory"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1016218223"},{"key":"ref14","first-page":"1","author":"seiffert","year":"2008","journal-title":"Rusboost Improving classification performance when training data is skewed"},{"journal-title":"A more robust boosting algorithm","year":"2009","author":"freund","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21742\/ijria.2014.2.1.01"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.6.24"},{"key":"ref4","article-title":"A self-protection agent using error correcting output codes to secure computers and applications","author":"de la","year":"2017","journal-title":"IEEE International Conference on Cloud and Autonomic Computing"},{"key":"ref3","first-page":"1","volume":"1","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref8","article-title":"Introduction to information retrieval","author":"sch\u00fctze","year":"2008","journal-title":"Proceedings of the international communication of association for computing machinery conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-016-1863-z"},{"key":"ref1","volume":"17?017","author":"pang","year":"2017","journal-title":"Security breaches in the us federal government"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref20","article-title":"Malicious javascript detection by features extraction","volume":"8","author":"canfora","year":"2014","journal-title":"e-Informatica Software Engineering Journal"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945697"},{"key":"ref21","first-page":"149","article-title":"Binspect: Holistic analysis and detection of malicious web pages.","author":"eshete","year":"2012","journal-title":"SECURECOMM"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015565"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.136"}],"event":{"name":"2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2018,10,28]]},"location":"Aqaba","end":{"date-parts":[[2018,11,1]]}},"container-title":["2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8612460\/8612765\/08612855.pdf?arnumber=8612855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:00:24Z","timestamp":1643241624000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8612855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2018.8612855","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}