{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T07:15:10Z","timestamp":1771485310057,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["n.257007"],"award-info":[{"award-number":["n.257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590347","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"171-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["On the effectiveness of risk prediction based on users browsing behavior"],"prefix":"10.1145","author":[{"given":"Davide","family":"Canali","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Leyla","family":"Bilge","sequence":"additional","affiliation":[{"name":"Symantec Research Labs, Biot, France"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa. Alexa Browse by Category. http:\/\/www.alexa.com\/topsites\/category\/Top 2013.  Alexa. Alexa Browse by Category. http:\/\/www.alexa.com\/topsites\/category\/Top 2013."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. Alexa Top Websites. http:\/\/www.alexa.com\/topsites 2013.  Alexa. Alexa Top Websites. http:\/\/www.alexa.com\/topsites 2013."},{"key":"e_1_3_2_1_3_1","unstructured":"amada.abuse.ch. Malware Database (AMaDa) :: AMaDa Blocklist. http:\/\/amada.abuse.ch\/blocklist.php?download=domainblocklist 2013.  amada.abuse.ch. Malware Database (AMaDa) :: AMaDa Blocklist. http:\/\/amada.abuse.ch\/blocklist.php?download=domainblocklist 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"e_1_3_2_1_5_1","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop C. M.","year":"2006","unstructured":"C. M. Bishop . nformation Science and Statistics . In Pattern Recognition and Machine Learning . Springer , 2006 . C. M. Bishop. nformation Science and Statistics. In Pattern Recognition and Machine Learning. Springer, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"Ninth Workshop on the Economics of Information Security (WEIS)","author":"Bohme R.","year":"2010","unstructured":"R. Bohme and G. Schwartz . Modeling cyber-insurance: Towards a unifying framework . In Ninth Workshop on the Economics of Information Security (WEIS) , 2010 . R. Bohme and G. Schwartz. Modeling cyber-insurance: Towards a unifying framework. In Ninth Workshop on the Economics of Information Security (WEIS), 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/345662"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6132-6_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_6"},{"key":"e_1_3_2_1_10_1","volume-title":"An Introduction to the Theory of Statistics","author":"Y.","year":"1968","unstructured":"Y. G.U. and K. M.G. An Introduction to the Theory of Statistics ( 14 th ed.). Charles Griffin & Co. , 1968 . Y. G.U. and K. M.G. An Introduction to the Theory of Statistics (14th ed.). Charles Griffin & Co., 1968.","edition":"14"},{"key":"e_1_3_2_1_11_1","volume-title":"Kaspersky Security Bulletin","year":"2012","unstructured":"Kaspersky. Kaspersky Security Bulletin 2012 . http:\/\/www.securelist.com\/en\/analysis\/204792255\/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012, 2012. Kaspersky. Kaspersky Security Bulletin 2012. http:\/\/www.securelist.com\/en\/analysis\/204792255\/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012, 2012."},{"key":"e_1_3_2_1_12_1","unstructured":"C. Ke J. Oliver and Y. Xiang. Analysis of the Australian Web Threat Landscape. http:\/\/www.trendmicro.com.au\/cloud-content\/au\/pdfs\/security-intelligence\/white-papers\/australian_web_threat_landscape_-v7.pdf May 2013.  C. Ke J. Oliver and Y. Xiang. Analysis of the Australian Web Threat Landscape. http:\/\/www.trendmicro.com.au\/cloud-content\/au\/pdfs\/security-intelligence\/white-papers\/australian_web_threat_landscape_-v7.pdf May 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516747"},{"key":"e_1_3_2_1_14_1","first-page":"18","volume":"2","author":"Liaw A.","year":"2002","unstructured":"A. Liaw and M. Wiener . Classification and regression by randomforest. In R News , volume 2\/3 , page 18 , 2002 . A. Liaw and M. Wiener. Classification and regression by randomforest. In R News, volume 2\/3, page 18, 2002.","journal-title":"Classification and regression by randomforest. In R News"},{"key":"e_1_3_2_1_15_1","unstructured":"M. D. List. Malware Domains List. http:\/\/www.malwaredomainlist.com\/ 2013.  M. D. List. Malware Domains List. http:\/\/www.malwaredomainlist.com\/ 2013."},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/longurl.org\/services","author":"Shortening URL","year":"2013","unstructured":"URL Shortening Services - A List of URL Shorteners . http:\/\/longurl.org\/services , 2013 . URL Shortening Services - A List of URL Shorteners. http:\/\/longurl.org\/services, 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-642-22424-9_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Maier G.","year":"2011","unstructured":"G. Maier , A. Feldmann , V. Paxson , R. Sommer , and M. Vallentin . An assessment of overt malicious activity manifest in residential networks . In Detection of Intrusions and Malware, and Vulnerability Assessment , pages 144 -- 163 . Springer , 2011 . G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin. An assessment of overt malicious activity manifest in residential networks. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 144--163. Springer, 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"http:\/\/malc0de.com\/bl\/BOOT","year":"2013","unstructured":"Malcode. Malcode. http:\/\/malc0de.com\/bl\/BOOT , 2013 . Malcode. Malcode. http:\/\/malc0de.com\/bl\/BOOT, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358994"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963773"},{"key":"e_1_3_2_1_21_1","volume-title":"5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012","author":"Olejnik L.","year":"2012","unstructured":"L. Olejnik , C. Castelluccia , and A. Janc . Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns . In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012 ), Vigo, Espagne , July 2012 . L. Olejnik, C. Castelluccia, and A. Janc. Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012), Vigo, Espagne, July 2012."},{"key":"e_1_3_2_1_22_1","volume-title":"19th Annual Network and Distributed System Security Symposium (NDSS), NDSS","author":"Onarlioglu K.","year":"2012","unstructured":"K. Onarlioglu , U. O. Yilmaz , D. Balzarotti , and E. Kirda . Insights into user behavior in dealing with internet attacks . In 19th Annual Network and Distributed System Security Symposium (NDSS), NDSS 12, January 2012 . K. Onarlioglu, U. O. Yilmaz, D. Balzarotti, and E. Kirda. Insights into user behavior in dealing with internet attacks. In 19th Annual Network and Distributed System Security Symposium (NDSS), NDSS 12, January 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.11.028"},{"key":"e_1_3_2_1_24_1","unstructured":"O. D. Project. DMOZ Open Directory Project. http:\/\/www.dmoz.org\/ 2013.  O. D. Project. DMOZ Open Directory Project. http:\/\/www.dmoz.org\/ 2013."},{"key":"e_1_3_2_1_25_1","volume-title":"Programs for machine learning","author":"Quinlan J.","year":"1993","unstructured":"J. Quinlan . C4.5 : Programs for machine learning . In Morgan Kaufmann Publishers , 1993 . J. Quinlan. C4.5: Programs for machine learning. In Morgan Kaufmann Publishers, 1993."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ratanaworabhan P.","year":"2009","unstructured":"P. Ratanaworabhan , B. Livshits , B., and Zorn. Nozzle : a defense against heap-spraying code injection attacks . In Proceedings of the USENIX Security Symposium , 2009 . P. Ratanaworabhan, B. Livshits, B., and Zorn. Nozzle: a defense against heap-spraying code injection attacks. In Proceedings of the USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/code.google.com\/apis\/safebrowsing\/","author":"Google Safe","year":"2008","unstructured":"Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/ , 2008 . Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/, 2008."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00144-008-0033-3"},{"key":"e_1_3_2_1_29_1","unstructured":"Symantec. 2013 Internet Security Threat Report. http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp 2013.  Symantec. 2013 Internet Security Threat Report. http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"Norton Safe Web. https:\/\/safeweb.norton.com\/","year":"2013","unstructured":"Symantec. Norton Safe Web. https:\/\/safeweb.norton.com\/ , 2013 . Symantec. Norton Safe Web. https:\/\/safeweb.norton.com\/, 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"http:\/\/www.tblop.com\/","author":"The Big TBLOP","year":"2013","unstructured":"TBLOP - The Big List of Porn . http:\/\/www.tblop.com\/ , 2013 . TBLOP - The Big List of Porn. http:\/\/www.tblop.com\/, 2013."},{"key":"e_1_3_2_1_32_1","volume-title":"http:\/\/www.torrentresource.com\/","author":"Sites Torrent","year":"2013","unstructured":"Torrent Sites . http:\/\/www.torrentresource.com\/ , 2013 . Torrent Sites. http:\/\/www.torrentresource.com\/, 2013."},{"key":"e_1_3_2_1_33_1","unstructured":"S. J. Vaughan-Nichols. How the Syrian Electronic Army took out the New York Times and Twitter sites. http:\/\/www.zdnet.com\/how-the-syrian-electronic-army-took-out-the-new-york-times-and-twitter-sites-7000019989\/ August 2013.  S. J. Vaughan-Nichols. How the Syrian Electronic Army took out the New York Times and Twitter sites. http:\/\/www.zdnet.com\/how-the-syrian-electronic-army-took-out-the-new-york-times-and-twitter-sites-7000019989\/ August 2013."},{"key":"e_1_3_2_1_34_1","unstructured":"Websense. Websense 2013 Threat Report. http:\/\/www.websense.com\/content\/websense-2013-threat-report.aspx?cmpid=prnr2.13.13 2013.  Websense. Websense 2013 Threat Report. http:\/\/www.websense.com\/content\/websense-2013-threat-report.aspx?cmpid=prnr2.13.13 2013."},{"key":"e_1_3_2_1_35_1","volume-title":"Ninth Workshop on the Economics of Information Security (WEIS)","author":"Wondracek G.","year":"2010","unstructured":"G. Wondracek , T. Holz , C. Platzer , E. Kirda , and C. Kruegel . Is the internet for porn? an insight into the online adult industry . In Ninth Workshop on the Economics of Information Security (WEIS) , 2010 . G. Wondracek, T. Holz, C. Platzer, E. Kirda, and C. Kruegel. Is the internet for porn? an insight into the online adult industry. In Ninth Workshop on the Economics of Information Security (WEIS), 2010."},{"key":"e_1_3_2_1_36_1","volume-title":"http:\/\/xboxpirate.eu\/forums\/topic\/280-list-of-file-hosting-and-sharing-websites-137-entries\/","author":"File Hosting List","year":"2013","unstructured":"List of File Hosting and Sharing Websites . http:\/\/xboxpirate.eu\/forums\/topic\/280-list-of-file-hosting-and-sharing-websites-137-entries\/ , 2013 . List of File Hosting and Sharing Websites. http:\/\/xboxpirate.eu\/forums\/topic\/280-list-of-file-hosting-and-sharing-websites-137-entries\/, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"The Optimality of Naive Bayes. In FLAIRS 2004 conference","author":"Zhang H.","year":"2004","unstructured":"H. Zhang . The Optimality of Naive Bayes. In FLAIRS 2004 conference , 2004 . H. Zhang. The Optimality of Naive Bayes. In FLAIRS 2004 conference, 2004."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590347","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":37,"alternative-id":["10.1145\/2590296.2590347","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590347","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}