{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T11:02:31Z","timestamp":1778065351899,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T00:00:00Z","timestamp":1521849600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["DUE 1241772 CNS 1319212 DGE 1433817"],"award-info":[{"award-number":["DUE 1241772 CNS 1319212 DGE 1433817"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041008.3041016","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T10:54:21Z","timestamp":1490352861000},"page":"55-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["What's in a URL"],"prefix":"10.1145","author":[{"given":"Rakesh","family":"Verma","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Avisha","family":"Das","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ling spam corpus. http:\/\/csmining.org\/index.php\/ling-spam-datasets.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Spam block lists. http:\/\/www.joewein.de\/sw\/blacklist.htm#use."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981345.2981373"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248566"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984093.2984140"},{"key":"e_1_3_2_1_8_1","unstructured":"H. Daum\u00e9 III. A course in machine learning: The perceptron. http:\/\/ciml.info 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390190"},{"key":"e_1_3_2_1_10_1","unstructured":"M. Geide. N-gram character sequence analysis of benign vs. malicious domains\/urls. http:\/\/research.zscaler.com\/2010\/04\/fun-with-n-gram-analysis.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030397"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196419"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11752912_12"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/github.com\/tetsuok\/arowpp","author":"Kiso T.","year":"2011","unstructured":"T. Kiso. Arowpp. https:\/\/github.com\/tetsuok\/arowpp, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961202"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_10"},{"key":"e_1_3_2_1_22_1","volume-title":"Online learning library. https:\/\/code.google.com\/p\/oll\/","author":"Okanohara D.","year":"2010","unstructured":"D. Okanohara. Online learning library. https:\/\/code.google.com\/p\/oll\/, 2010."},{"key":"e_1_3_2_1_23_1","volume-title":"Online learning: Theory, algorithms, and applications","author":"Shaleve-Shwartz S.","year":"2007","unstructured":"S. Shaleve-Shwartz. Online learning: Theory, algorithms, and applications. 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699115"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_47"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2012.6526142"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487647"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","location":"Scottsdale Arizona USA","acronym":"CODASPY '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041016","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:27:23Z","timestamp":1763458043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041016"}},"subtitle":["Fast Feature Extraction and Malicious URL Detection"],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":30,"alternative-id":["10.1145\/3041008.3041016","10.1145\/3041008"],"URL":"https:\/\/doi.org\/10.1145\/3041008.3041016","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}