{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:27Z","timestamp":1759092147069},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/cccs.2019.8888147","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T23:58:48Z","timestamp":1572566328000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Analysis and Categorization of Drive-by Download Malware"],"prefix":"10.1109","author":[{"given":"Mohit","family":"Singhal","sequence":"first","affiliation":[]},{"given":"David","family":"Levine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Symposium on Network and Distributed System Security","article-title":"A crawler based study of spyware on the web","year":"2006","key":"ref10"},{"year":"0","key":"ref11","article-title":"Ph0neutria malware crawler"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13","article-title":"Cuckoo sandbox documentation"},{"journal-title":"VMRay analysis","year":"0","key":"ref14"},{"year":"0","key":"ref15","article-title":"VirusTotal official website"},{"year":"0","key":"ref16","article-title":"YARA documentation"},{"journal-title":"Accenture 2019 Cost of Cybercrime Study","year":"0","key":"ref17"},{"year":"0","key":"ref4","article-title":"The Cost of Malicious Cyber Activity to the U.S. Economy"},{"year":"0","key":"ref3","article-title":"Malware statistics and trends report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_10"},{"article-title":"Evaluation tool based automated malware analysis through persistence mechanism detection","year":"2016","author":"webb","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.05.027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"year":"0","key":"ref1","article-title":"2019 Internet Security Threat Report"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/2382196.2382283","article-title":"Manufacturing, Compromise, The Emergence of Exploit-as-a-Service","author":"grier","year":"2012","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS)"}],"event":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","start":{"date-parts":[[2019,10,10]]},"location":"Rome, Italy","end":{"date-parts":[[2019,10,12]]}},"container-title":["2019 4th International Conference on Computing, Communications and Security (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8883094\/8888030\/08888147.pdf?arnumber=8888147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T10:24:08Z","timestamp":1695378248000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cccs.2019.8888147","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}