{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:00:40Z","timestamp":1764842440848},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/USG.html"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1109\/isi49825.2020.9280522","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T00:41:06Z","timestamp":1607474466000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites"],"prefix":"10.1109","author":[{"given":"Mir Mehedi","family":"Ahsan Pritom","sequence":"first","affiliation":[]},{"given":"Kristin M.","family":"Schweitzer","sequence":"additional","affiliation":[]},{"given":"Raymond M.","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Min","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"year":"2020","key":"ref30","article-title":"Shannon entropy"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961202"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8992930"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041016"},{"article-title":"MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK","year":"2017","author":"abdi","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895751"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997494"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2912551"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279800"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422261"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0124472"},{"article-title":"Cisco umbrella 1 million","year":"2016","author":"hubbard","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0008902202890298"},{"year":"2020","key":"ref27","article-title":"Free covid-19 threat list - domain risk assessments for coronavirus threats"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICEI.2019.00092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.004"},{"article-title":"wordninja 2.0.0","year":"2019","author":"anderson","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.10211"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435366"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"article-title":"Spotting and blacklisting malicious covid-19-themed sites","year":"2020","author":"zorz","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEA.2019.8858300"},{"article-title":"Amid covid-19, global orgs see a 148% spike in ransomware attacks; finance industry heavily targeted","year":"2020","author":"patrick upatham","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834227"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2017.2734904"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10597-6_1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3005714"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190639"},{"year":"2020","key":"ref26","article-title":"Covid-19 (coronavirus) phishing scam tracker"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3191680"}],"event":{"name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2020,11,9]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2020,11,10]]}},"container-title":["2020 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9280504\/9280475\/09280522.pdf?arnumber=9280522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:51:07Z","timestamp":1656438667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9280522\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isi49825.2020.9280522","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}