{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T16:27:43Z","timestamp":1776270463416,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccnt.2018.8494159","type":"proceedings-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T21:36:24Z","timestamp":1541453784000},"page":"1-6","source":"Crossref","is-referenced-by-count":31,"title":["Comparative Study of the Detection of Malicious URLs Using Shallow and Deep Networks"],"prefix":"10.1109","author":[{"given":"Anu","family":"Vazhayil","sequence":"first","affiliation":[]},{"given":"R.","family":"Vinayakumar","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Soman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref11","author":"gers","year":"1999","journal-title":"Learning to forget Continual prediction with lstm"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref13","first-page":"115","article-title":"Learning precise timing with lstm recurrent networks","volume":"3","author":"gers","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref14","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"OSDI"},{"key":"ref15","author":"chollet","year":"2017","journal-title":"Keras (2015)"},{"key":"ref16","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169429"},{"key":"ref18","author":"moazzezi","year":"2011","journal-title":"Change-based population coding"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EBISS.2009.5138008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099649"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77465-5_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-642-41674-3_32","article-title":"Malicious web page detection: A machine learning approach","author":"sirageldin","year":"2014","journal-title":"Advances in Computer Science and Its Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0034-3"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-981-10-8476-8_6","article-title":"Scalable framework for cyber threat situational awareness based on domain name systems data analysis","author":"vinayakumar","year":"2018","journal-title":"Big Data in Engineering Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0364-0213(90)90002-E"}],"event":{"name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Bangalore","start":{"date-parts":[[2018,7,10]]},"end":{"date-parts":[[2018,7,12]]}},"container-title":["2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8476666\/8493493\/08494159.pdf?arnumber=8494159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T18:35:55Z","timestamp":1598207755000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8494159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccnt.2018.8494159","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}