{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:22Z","timestamp":1750306462951,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837185.2837260","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Client-oriented web alteration detection system using link change state of a web page based on past and current page content"],"prefix":"10.1145","author":[{"given":"Shouta","family":"Mochizuki","sequence":"first","affiliation":[{"name":"The University of Electro-Communications, Chofu, Tokyo, Japan"}]},{"given":"Tetsuji","family":"Takada","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications, Chofu, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"issue":"2014","key":"e_1_3_2_1_1_1","first-page":"20","volume":"17","author":"Microsoft Inc.","year":"2015","unstructured":"Microsoft Inc. : Microsoft Security Intelligent Report , Vol. 17 , ( 2014 ), Accessed June 20 , 2015 from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=44937. Microsoft Inc.: Microsoft Security Intelligent Report, Vol. 17, (2014), Accessed June 20, 2015 from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=44937.","journal-title":"Microsoft Security Intelligent Report"},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","author":"Google Inc.","year":"2015","unstructured":"Google Inc. : Google Safe Browsing API , Accessed June 20, 2015 from http:\/\/developers.google.com\/safe-browsing\/. Google Inc.: Google Safe Browsing API, Accessed June 20, 2015 from http:\/\/developers.google.com\/safe-browsing\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Accessed","author":"Gibbs S.","year":"2015","unstructured":"S. Gibbs , Antivirus software is dead, says security expert at Symantec , Accessed Aug 30, 2015 from http:\/\/www.theguardian.com\/technology\/2004\/may\/06\/antivirus-software-fails-catch--attacks-security-expert-symantec S. Gibbs, Antivirus software is dead, says security expert at Symantec, Accessed Aug 30, 2015 from http:\/\/www.theguardian.com\/technology\/2004\/may\/06\/antivirus-software-fails-catch--attacks-security-expert-symantec"},{"key":"e_1_3_2_1_4_1","first-page":"5","volume":"93","author":"Akiyama M.","year":"2010","unstructured":"M. Akiyama , M. Iwamura , Y. Kawakoya , K. Aoki , and M. Itoh: Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Trans. on Comm. Vol. E93 -B, No. 5 , pp. 1131--1139, ( 2010 ) M. Akiyama, M. Iwamura, Y. Kawakoya, K. Aoki, and M. Itoh: Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Trans. on Comm. Vol. E93-B, No. 5, pp. 1131--1139, (2010)","journal-title":"Trans. on Comm."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the Network and Distributed System Security (NDSS)","author":"Wang Y.","year":"2006","unstructured":"Y. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King : Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities , Proc. of the Network and Distributed System Security (NDSS) , ( 2006 ) Y. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities, Proc. of the Network and Distributed System Security (NDSS), (2006)"},{"volume-title":"Accessed","year":"2015","key":"e_1_3_2_1_6_1","unstructured":"W3C : Content Security Policy Level 2 W3C Last Call Working Draft , Accessed June 20, 2015 from http:\/\/www.w3.org\/TR\/CSP2\/. W3C: Content Security Policy Level 2 W3C Last Call Working Draft, Accessed June 20, 2015 from http:\/\/www.w3.org\/TR\/CSP2\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"issue":"2014","key":"e_1_3_2_1_8_1","first-page":"20","volume":"17","author":"Microsoft Inc.","year":"2015","unstructured":"Microsoft Inc. : Microsoft Security Intelligent Report , Vol. 17 , ( 2014 ), Accessed June 20 , 2015 from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=44937. Microsoft Inc.: Microsoft Security Intelligent Report, Vol. 17, (2014), Accessed June 20, 2015 from http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=44937.","journal-title":"Microsoft Security Intelligent Report"},{"key":"e_1_3_2_1_9_1","first-page":"19","volume-title":"An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors Proc. of 9th Asia Joint Conf. on Information Security (ASIA JCIS)","author":"Matsunaka T.","year":"2014","unstructured":"T. Matsunaka , A. Kubota , and T. Kasama : An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors Proc. of 9th Asia Joint Conf. on Information Security (ASIA JCIS) , pp. 19 -- 25 , ( 2014 ) T. Matsunaka, A. Kubota, and T. Kasama: An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors Proc. of 9th Asia Joint Conf. on Information Security (ASIA JCIS), pp. 19--25, (2014)"},{"key":"e_1_3_2_1_10_1","unstructured":"P. Passeri \"A 0-Day Attack Lasts On Average 10 Months\" 19 October 2012 Accessed October 25 2015 from from http:\/\/hackmageddon.com\/2012\/10\/19\/a-0-day-attack-lasts-on-average-10-months\/.  P. Passeri \"A 0-Day Attack Lasts On Average 10 Months\" 19 October 2012 Accessed October 25 2015 from from http:\/\/hackmageddon.com\/2012\/10\/19\/a-0-day-attack-lasts-on-average-10-months\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387592"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516725"}],"event":{"name":"iiWAS '15: The 17th International Conference on Information Integration and Web-based Application & Services","acronym":"iiWAS '15","location":"Brussels Belgium"},"container-title":["Proceedings of the 17th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837185.2837260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:36Z","timestamp":1750225416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":12,"alternative-id":["10.1145\/2837185.2837260","10.1145\/2837185"],"URL":"https:\/\/doi.org\/10.1145\/2837185.2837260","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}