{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:38:19Z","timestamp":1725543499973},"reference-count":3,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999407","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:44:39Z","timestamp":1421721879000},"page":"40-49","source":"Crossref","is-referenced-by-count":0,"title":["Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud"],"prefix":"10.1109","author":[{"given":"Ferenc","family":"Leitold","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Arrott","sequence":"additional","affiliation":[]},{"given":"Fernando C.","family":"Colon Osorio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Testing Endpoint Protections Against Malicious URLs on Social Media Sites","year":"2013","author":"ferenc","key":"3"},{"key":"2","article-title":"Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative protection testing","author":"andreas","year":"2014","journal-title":"Proceedings of the 9th International Conference on Malicious and Unwanted Software"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703682"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999407.pdf?arnumber=6999407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T18:00:47Z","timestamp":1603303247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6999407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":3,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999407","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}