{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:17:05Z","timestamp":1729678625930,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iscc.2016.7543735","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T20:35:08Z","timestamp":1471552508000},"page":"173-179","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of malware download sites by focusing on time series variation of malware"],"prefix":"10.1109","author":[{"given":"Yasuyuki","family":"Tanaka","sequence":"first","affiliation":[]},{"given":"Atsuhiro","family":"Goto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Exploring the Blackhole Exploit Kit","year":"0","author":"howard","key":"ref10"},{"journal-title":"Malware Traffic Analysis","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2157699"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964123"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557575"},{"key":"ref17","article-title":"WebWitness: Investigating, categorizing, and mitigating malware download paths","author":"nelms","year":"2015","journal-title":"Proc of the 24th USENIX Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.1131"},{"key":"ref3","article-title":"All Your iFRAMEs Point to Us","author":"provo","year":"2008","journal-title":"Proc of the 17th USENIX Security Symposium"},{"journal-title":"urI Query","year":"0","key":"ref6"},{"journal-title":"Malware Domain List","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"journal-title":"CLEAN MX Realtime Database","year":"0","key":"ref7"},{"volume":"20","journal-title":"Internet Security Threat Report","year":"2015","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"journal-title":"Caida as Ranking","year":"0","key":"ref9"}],"event":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2016,6,27]]},"location":"Messina, Italy","end":{"date-parts":[[2016,6,30]]}},"container-title":["2016 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536670\/7543699\/07543735.pdf?arnumber=7543735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T23:27:12Z","timestamp":1475191632000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7543735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscc.2016.7543735","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}