{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:30Z","timestamp":1750220430635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T00:00:00Z","timestamp":1608768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,24]]},"DOI":"10.1145\/3446132.3446183","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T00:13:50Z","timestamp":1615335230000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Malicious Web Page Detection Model based on SVM Algorithm"],"prefix":"10.1145","author":[{"given":"Jingbing","family":"Chen","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Jie","family":"Yuan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Yuewei","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Yiqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Yufan","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Ruiqi","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcis.2012.2204"},{"key":"e_1_3_2_1_2_1","volume-title":"Full-network anomaly detection method based on multi-scale principal component analysis[J]. Journal of software engineering","author":"Qian Yekui","year":"2012","unstructured":"Yekui Qian , Ming Chen , Lixin Ye. 2012. Full-network anomaly detection method based on multi-scale principal component analysis[J]. Journal of software engineering , 2012 . 23(2): 361-377. Yekui Qian, Ming Chen, Lixin Ye. 2012. Full-network anomaly detection method based on multi-scale principal component analysis[J]. Journal of software engineering, 2012. 23(2): 361-377."},{"key":"e_1_3_2_1_3_1","volume-title":"NELSON J and ONAK K","author":"HARVEY N J","year":"2008","unstructured":"HARVEY N J A , NELSON J and ONAK K . 2008 . Sketching and streaming entropy via approximation theory[C]. The 49th Annual IEEE Symptom on Foundation of Computer Science. Piscataway , New York : IEEE , 2008: 489-498. HARVEY N J A, NELSON J and ONAK K. 2008. Sketching and streaming entropy via approximation theory[C]. The 49th Annual IEEE Symptom on Foundation of Computer Science. Piscataway, New York: IEEE, 2008: 489-498."},{"key":"e_1_3_2_1_4_1","volume-title":"The 8th ACM SIGCOMM Conference on Int Measurement, New York: ACM","author":"NYCHIS G, SEKAR V, ANDERSEN","year":"2008","unstructured":"NYCHIS G, SEKAR V, ANDERSEN D G and 2008 . An empirical evaluation of entropy-based traffic anomaly detection[C] . The 8th ACM SIGCOMM Conference on Int Measurement, New York: ACM , 2008: 151-156. NYCHIS G, SEKAR V, ANDERSEN D G and 2008. An empirical evaluation of entropy-based traffic anomaly detection[C]. The 8th ACM SIGCOMM Conference on Int Measurement, New York: ACM, 2008: 151-156."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015698.32353.61"},{"key":"e_1_3_2_1_6_1","first-page":"296","volume-title":"IJCSNS Int Journal of Computer Science and Network Security","author":"CHANDRASEKAR A, VASUDEVAN","year":"2009","unstructured":"CHANDRASEKAR A, VASUDEVAN V and YOGESH P. 2009 . Evolutionary approach for network anomaly detection using effective classification[J] . IJCSNS Int Journal of Computer Science and Network Security , 2009, 9(1): 296 - 302 . CHANDRASEKAR A, VASUDEVAN V and YOGESH P. 2009. Evolutionary approach for network anomaly detection using effective classification[J]. IJCSNS Int Journal of Computer Science and Network Security, 2009, 9(1): 296-302."},{"issue":"4","key":"e_1_3_2_1_7_1","first-page":"2091","article-title":"2013","volume":"15","author":"Mahmoud K, Youssef","year":"2013","unstructured":"Mahmoud K, Youssef I and Andrew J . 2013 . Phishing Detection: A Literature Survey. IEEE Communication Surveys & Tutorials , 2013 , 15 ( 4 ): 2091 - 2121 Mahmoud K, Youssef I and Andrew J. 2013. Phishing Detection: A Literature Survey. IEEE Communication Surveys & Tutorials, 2013, 15(4): 2091-2121","journal-title":"Phishing Detection: A Literature Survey. IEEE Communication Surveys & Tutorials"},{"key":"e_1_3_2_1_8_1","first-page":"639","volume-title":"Banff","author":"Yue Zhang","year":"2007","unstructured":"Zhang Yue , Jason I. Hong and Lorrie F. 2007. Cranor. Cantina: a content-based approach to detecting phishing web sites\/\/Proceedings of the 16th international conference on World Wide Web(WWW) . Banff , Alberta, Canada , 2007 : 639 - 648 . Zhang Yue, Jason I. Hong and Lorrie F. 2007. Cranor. Cantina: a content-based approach to detecting phishing web sites\/\/Proceedings of the 16th international conference on World Wide Web(WWW). Banff, Alberta, Canada, 2007:639-648."},{"key":"e_1_3_2_1_9_1","first-page":"529","volume-title":"Journal of Computer Science","author":"Sha Hongzhou","year":"2016","unstructured":"Hongzhou Sha , Qingyun Liu , Tingwen Liu , Zhou Zhou , Li Guo and Binxing Fang . 2016 . Review of research on malicious web page identification[J] . Journal of Computer Science , 2016, 39(03): 529 - 542 . Hongzhou Sha, Qingyun Liu, Tingwen Liu, Zhou Zhou, Li Guo and Binxing Fang. 2016. Review of research on malicious web page identification[J]. Journal of Computer Science, 2016, 39(03): 529-542."},{"volume-title":"USA","author":"Saul Lawrence K.","key":"e_1_3_2_1_10_1","unstructured":"Ma, Justin, Lawrence K. Saul , Stefan Savage and Geoffrey M. Voelker . 2009. Beyond blacklists: learning to detect malicious web sites from suspicious URLs\/\/Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York , USA , 2009: 1245-1253 Ma, Justin, Lawrence K. Saul, Stefan Savage and Geoffrey M. Voelker. 2009. Beyond blacklists: learning to detect malicious web sites from suspicious URLs\/\/Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, USA, 2009: 1245-1253"},{"key":"e_1_3_2_1_11_1","volume-title":"Research on Chinese text classification based on improved TF-IDF and Support Vector Machine[J]. software","author":"Guo Taiyong","year":"2016","unstructured":"Taiyong Guo . 2016. Research on Chinese text classification based on improved TF-IDF and Support Vector Machine[J]. software , 2016 (12). Taiyong Guo. 2016. Research on Chinese text classification based on improved TF-IDF and Support Vector Machine[J]. software, 2016(12)."},{"key":"e_1_3_2_1_12_1","volume-title":"Analysis and research of maliciousURL recognition based on Support Vector Machine and TF-IDF[J]. Computers and modernization","author":"Gan Hong","year":"2016","unstructured":"Hong Gan and Dan Pan . 2016. Analysis and research of maliciousURL recognition based on Support Vector Machine and TF-IDF[J]. Computers and modernization , 2016 (7): 95-97. Hong Gan and Dan Pan. 2016. Analysis and research of maliciousURL recognition based on Support Vector Machine and TF-IDF[J]. Computers and modernization, 2016(7): 95-97."},{"key":"e_1_3_2_1_13_1","volume-title":"Implementation of an improved TF-IDF Algorithm and its application in spam recognition[D]","author":"Song Xingzu","year":"2012","unstructured":"Xingzu Song . 2012. Implementation of an improved TF-IDF Algorithm and its application in spam recognition[D] . Jilin University , 2012 . Xingzu Song. 2012. Implementation of an improved TF-IDF Algorithm and its application in spam recognition[D]. Jilin University, 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE","author":"Chen Y H","year":"2011","unstructured":"Chen Y H , Tsai Y H and Chen Y T . 2011. Chinese readability assessment using TF-IDF and SVM[C]\/\/ International Conference on Machine Learning and Cybernetics . IEEE , 2011 . Chen Y H, Tsai Y H and Chen Y T. 2011. Chinese readability assessment using TF-IDF and SVM[C]\/\/ International Conference on Machine Learning and Cybernetics. IEEE, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Polarity analysis model of bomb screen text emotion based on TF-IDF and SVM[J]. Modern trade industry","author":"Ma Mengxi","year":"2019","unstructured":"Mengxi Ma and Jun Zhang . 2019. Polarity analysis model of bomb screen text emotion based on TF-IDF and SVM[J]. Modern trade industry , 2019 , 40(08):209-211. Mengxi Ma and Jun Zhang. 2019. Polarity analysis model of bomb screen text emotion based on TF-IDF and SVM[J]. Modern trade industry, 2019, 40(08):209-211."},{"key":"e_1_3_2_1_16_1","volume-title":"Optimization of semidefinite programming Support Vector Machine by means of kernel K-Means clustering subsampling[J]","author":"He Hui","year":"2013","unstructured":"Hui He , Xiaohong Hu , Hua Tan and 2013. Optimization of semidefinite programming Support Vector Machine by means of kernel K-Means clustering subsampling[J] . Journal of Jiangxi Normal University ( nature), 2013 , 37(6):574-578. Hui He, Xiaohong Hu, Hua Tan and 2013. Optimization of semidefinite programming Support Vector Machine by means of kernel K-Means clustering subsampling[J]. Journal of Jiangxi Normal University (nature), 2013, 37(6):574-578."},{"key":"e_1_3_2_1_17_1","volume-title":"Mingquan Zhou and Xuesong Wang","author":"Jin Youli","year":"2009","unstructured":"Youli Jin , Mingquan Zhou and Xuesong Wang . 2009 . Research on text classification method based on SVM and K-Means[J]. Computer Technology and de velopment, 2009, (11):35-37,41. Youli Jin, Mingquan Zhou and Xuesong Wang. 2009. Research on text classification method based on SVM and K-Means[J]. Computer Technology and development, 2009, (11):35-37,41."},{"key":"e_1_3_2_1_18_1","volume-title":"A new approach to data mining \u2013 Support Vector Machine[M]","author":"Deng Naiyang","year":"2004","unstructured":"Naiyang Deng and Yingjie Tian . 2004. A new approach to data mining \u2013 Support Vector Machine[M] . Beijing : SCience Press , 2004 . Naiyang Deng and Yingjie Tian. 2004. A new approach to data mining \u2013 Support Vector Machine[M]. Beijing: SCience Press, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"HangZhou: Zhejiang University","author":"Fan Xinwei","year":"2003","unstructured":"Xinwei Fan . 2003 . Research on Support Vector Machine Algorithm and its applications[D] . HangZhou: Zhejiang University , 2003. Xinwei Fan. 2003. Research on Support Vector Machine Algorithm and its applications[D]. HangZhou: Zhejiang University, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2011.529413"},{"key":"e_1_3_2_1_21_1","volume-title":"A novel unsupervised classification approach for network anomaly detection by K-Means clustering and ID3 decision tree learning methods[J]. Journal of Super computing","author":"YASAMI","year":"2010","unstructured":"YASAMI Y and MOZAFFARI S P. 2010. A novel unsupervised classification approach for network anomaly detection by K-Means clustering and ID3 decision tree learning methods[J]. Journal of Super computing , 2010 , 53(1): 231-245. YASAMI Y and MOZAFFARI S P. 2010. A novel unsupervised classification approach for network anomaly detection by K-Means clustering and ID3 decision tree learning methods[J]. Journal of Super computing, 2010, 53(1): 231-245."}],"event":{"name":"ACAI 2020: 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence","acronym":"ACAI 2020","location":"Sanya China"},"container-title":["2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446132.3446183","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446132.3446183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:04Z","timestamp":1750193224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446132.3446183"}},"subtitle":["Research on the Enhancement of SVM Efficiency by Multiple Machine Learning Algorithms"],"short-title":[],"issued":{"date-parts":[[2020,12,24]]},"references-count":21,"alternative-id":["10.1145\/3446132.3446183","10.1145\/3446132"],"URL":"https:\/\/doi.org\/10.1145\/3446132.3446183","relation":{},"subject":[],"published":{"date-parts":[[2020,12,24]]},"assertion":[{"value":"2021-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}