{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:44:43Z","timestamp":1751564683478,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ssic.2015.7245681","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:39:50Z","timestamp":1441946390000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Malicious URL prediction based on community detection"],"prefix":"10.1109","author":[{"given":"Zheng","family":"Li-xiong","sequence":"first","affiliation":[]},{"given":"Xu","family":"Xiao-lin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Xuan-chen","sequence":"additional","affiliation":[]},{"given":"Ma","family":"Zhi-yuan","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Li-hong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A convex formulation of modularity maximization for community detection","author":"chan","year":"2011","journal-title":"Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI) Barcelona Spain"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1348549.1348552"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref13","first-page":"10008p","article-title":"Journal of Statistical Mechanics: Theory and Experiment","volume":"10","author":"blondel","year":"2008","journal-title":"Fast Unfolding of Communities in Large Networks"},{"year":"2006","author":"han","journal-title":"Data Mining Concepts and Techniques","key":"ref14"},{"key":"ref15","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"zico","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.istr.2009.03.003"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICC.2014.6883436"},{"key":"ref18","first-page":"2","article-title":"Android malware detection based on permissions","author":"xiaoyan","year":"2014"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICTAI.2013.53"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1103\/PhysRevE.69.066133"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"Association rule mining: A survey","author":"zhao","year":"2003","journal-title":"Nanyang Technological University Singapore"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1103\/PhysRevE.70.066111"},{"year":"2012","author":"harrington","journal-title":"Machine Learning in Action","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/342009.335372"},{"year":"0","key":"ref2"},{"year":"2014","author":"xiaoyan","journal-title":"Android malware detection based on permissions","key":"ref1"},{"key":"ref9","article-title":"An automated association rule mining technique with cumulative support thresholds","author":"kanimozhi","year":"2009","journal-title":"Int J Open Problems in Compt Math 2 3"}],"event":{"name":"2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2015,8,5]]},"location":"Shanghai, China","end":{"date-parts":[[2015,8,7]]}},"container-title":["2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7227128\/7245317\/07245681.pdf?arnumber=7245681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:17:48Z","timestamp":1490401068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7245681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ssic.2015.7245681","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}