{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T15:33:22Z","timestamp":1769441602914,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/bigdata.2013.6691627","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T14:11:49Z","timestamp":1388758309000},"page":"589-596","source":"Crossref","is-referenced-by-count":35,"title":["Malicious URL filtering &amp;#x2014; A big data application"],"prefix":"10.1109","author":[{"given":"Min-Sheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chien-Yi","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Yuh-Jye","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hsing-Kuo","family":"Pao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2012.258"},{"key":"17","author":"mustaca","year":"2011","journal-title":"Phishing Spam and Malware Statistics for February 2011"},{"key":"18","year":"0"},{"key":"15","year":"0"},{"key":"16","author":"micro","year":"0","journal-title":"Trend Micro Web Reputation Service"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"14","author":"maslennikov","year":"2013","journal-title":"Kaspersky Security Bulletin Statistics 2012"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"21","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"NDSS the Internet Society"},{"key":"3","year":"0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"2","year":"0"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390190"},{"key":"6","first-page":"551","article-title":"Online passive-aggressive algorithms","volume":"7","author":"crammer","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"4","author":"aaron","year":"2013","journal-title":"Global Phishing Survey trends and Domain Name Use in 2H2011"},{"key":"9","year":"0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"}],"event":{"name":"2013 IEEE International Conference on Big Data","location":"Silicon Valley, CA, USA","start":{"date-parts":[[2013,10,6]]},"end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE International Conference on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679357\/6690588\/06691627.pdf?arnumber=6691627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:27:08Z","timestamp":1490214428000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6691627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2013.6691627","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}