{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:52:48Z","timestamp":1730285568847,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/noms59830.2024.10575506","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:23:51Z","timestamp":1719941031000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service"],"prefix":"10.1109","author":[{"given":"Kyohei","family":"Takao","sequence":"first","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Chika","family":"Hiraishi","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Rui","family":"Tanabe","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Kazuki","family":"Takada","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Akira","family":"Fujita","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Daisuke","family":"Inoue","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Carlos","family":"Ga\u00f1\u00e1n","sequence":"additional","affiliation":[{"name":"Delft University of Technology (TUDelft),Netherlands"}]},{"given":"Michel","family":"van Eeten","sequence":"additional","affiliation":[{"name":"Delft University of Technology (TUDelft),Netherlands"}]},{"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"Yokohama National University (YNU),Japan"}]}],"member":"263","reference":[{"volume-title":"Kaspersky","year":"2022","key":"ref1"},{"article-title":"What is adware?","year":"2023","author":"Vigderman","key":"ref2"},{"article-title":"What is smishing and how to defend against it","volume-title":"Kasper-sky","year":"2022","key":"ref3"},{"article-title":"What is vishing? tips for spotting and avoiding voice scams","volume-title":"Norton","year":"2018","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015ICP0027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_22"},{"key":"ref7","first-page":"1","article-title":"An empirical analysis of phishing blacklists","volume-title":"6th Conference on Email and Anti-Spam (CEAS 09)","author":"Sheng"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1515\/pik-2012-0003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9913009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075552"},{"key":"ref12","first-page":"107","article-title":"Highly predictive blacklisting","volume-title":"USENIX security symposium","author":"Zhang"},{"issue":"2","key":"ref13","first-page":"752","article-title":"Unwanted message filtering system from osns users wall using customizable filtering rules and black list techniques","volume":"4","author":"Kachole","year":"2014","journal-title":"International Journal of Emerging Technology and Advanced Engineering (IJETAE)"},{"issue":"4","key":"ref14","first-page":"3611","article-title":"Customizable content based filtering method to filter texts and images from social network user wall","volume":"6","author":"Mahesh","year":"2015","journal-title":"International Journal of Computer Science and Information Technologies (IJCSIT)"},{"volume-title":"google safe browsing","year":"2022","key":"ref15"},{"article-title":"Mcafee\u00ae web boost","volume-title":"McAfee","year":"2022","key":"ref16"},{"article-title":"Norton safe search enhanced","volume-title":"Norton","year":"2022","key":"ref17"},{"article-title":"Free blocklists of suspected malicious ips and urls","volume-title":"Zeltser","year":"2021","key":"ref18"},{"article-title":"Phishtank \u2014 join the fight against phishing","volume-title":"PhishTank","year":"2022","key":"ref19"},{"article-title":"Phishing intelligence","volume-title":"OpenPhish","year":"2022","key":"ref20"},{"key":"ref21","first-page":"2361","article-title":"Measuring and modeling the label dynamics of online AntiMalware engines","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zhu"},{"article-title":"A large scale study and classification of virustotal reports on phishing and malware urls","year":"2022","author":"Choo","key":"ref22"},{"volume-title":"VirusTotal","year":"2024","key":"ref23"},{"article-title":"Browser extensions","volume-title":"VirusTotal","year":"2024","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3361751"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23250"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947260"},{"volume-title":"Warpdrive. WarpDrive","year":"2024","key":"ref29"},{"article-title":"virustotal developer hub","volume-title":"VirusTotal","year":"2022","key":"ref30"},{"key":"ref31","first-page":"1","article-title":"Exposure: Finding malicious domains using passive dns analysis","author":"Bilge","year":"2011","journal-title":"Ndss"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3191329"},{"key":"ref33","first-page":"1","article-title":"Searching urls that have similar features to the existing malicious urls","volume-title":"Computer Security Symposium 2014","volume":"2014","author":"Sun"},{"article-title":"Why do not you include statistics comparing antivirus performance?","volume-title":"VirusTotal","year":"2012","key":"ref34"}],"event":{"name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2024,5,6]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,5,10]]}},"container-title":["NOMS 2024-2024 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574855\/10574897\/10575506.pdf?arnumber=10575506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T04:08:25Z","timestamp":1720152505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/noms59830.2024.10575506","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}