{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:57Z","timestamp":1750220097516,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the science and technology research project of Jiangsu Provincial Public Security Department","award":["2020KX007Z"],"award-info":[{"award-number":["2020KX007Z"]}]},{"name":"the project of Jiangsu Provincial Department of Education","award":["20KJB413002"],"award-info":[{"award-number":["20KJB413002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487132","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:46Z","timestamp":1638909346000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detect Darknet URL Based on Artificial Neural Network"],"prefix":"10.1145","author":[{"given":"Jie","family":"Xu","sequence":"first","affiliation":[{"name":"Jiangsu Police Institute, China"}]},{"given":"Ao","family":"Ju","sequence":"additional","affiliation":[{"name":"Jiangsu Police Institute, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"126","volume-title":"Analysis of the Paradigm on Tor Attack Studies. 2020 8th International Conference on Information Technology and Multimedia (ICIMU)","author":"Irsyad Mohd Aminuddin M. A.","year":"2020","unstructured":"M. A. Irsyad Mohd Aminuddin , Z. F. Zaaba , A. Samsudin , N. B. Anuar Juma'at and S. Sukardi ( 2020 ). Analysis of the Paradigm on Tor Attack Studies. 2020 8th International Conference on Information Technology and Multimedia (ICIMU) , pp. 126 - 131 , doi: 10.1109\/ICIMU49871.2020.9243607. 10.1109\/ICIMU49871.2020.9243607 M. A. Irsyad Mohd Aminuddin, Z. F. Zaaba, A. Samsudin, N. B. Anuar Juma'at and S. Sukardi (2020). Analysis of the Paradigm on Tor Attack Studies. 2020 8th International Conference on Information Technology and Multimedia (ICIMU), pp. 126-131, doi: 10.1109\/ICIMU49871.2020.9243607."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728517"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2453983"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9345271"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3593"},{"key":"e_1_3_2_1_6_1","first-page":"837","volume-title":"Imbalanced Encrypted Traffic Classification Scheme Using Random Forest. 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Zhang F.","year":"2020","unstructured":"F. Zhang , T. Shang and J. Liu ( 2020 ). Imbalanced Encrypted Traffic Classification Scheme Using Random Forest. 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) , pp. 837 - 842 , doi: 10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00142. 10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00142 F. Zhang, T. Shang and J. Liu (2020). Imbalanced Encrypted Traffic Classification Scheme Using Random Forest. 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp. 837-842, doi: 10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00142."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851964"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2868054"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA52658.2021.00146"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HNICEM51456.2020.9400002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2016.7726800"},{"key":"e_1_3_2_1_13_1","first-page":"477","volume-title":"Support Vector Machine Accuracy Improvement with Classification. 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN)","author":"Mohan L.","year":"2020","unstructured":"L. Mohan , J. Pant , P. Suyal and A. Kumar ( 2020 ). Support Vector Machine Accuracy Improvement with Classification. 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) , pp. 477 - 481 , doi: 10.1109\/CICN49253.2020.9242572. 10.1109\/CICN49253.2020.9242572 L. Mohan, J. Pant, P. Suyal and A. Kumar (2020). Support Vector Machine Accuracy Improvement with Classification. 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 477-481, doi: 10.1109\/CICN49253.2020.9242572."},{"key":"e_1_3_2_1_14_1","first-page":"219","volume-title":"An Improved Weighted Naive Bayesian Classification Algorithm Based on Multivariable Linear Regression Model. 2016 9th International Symposium on Computational Intelligence and Design (ISCID)","author":"Wang X.","year":"2016","unstructured":"X. Wang and X. Sun ( 2016 ). An Improved Weighted Naive Bayesian Classification Algorithm Based on Multivariable Linear Regression Model. 2016 9th International Symposium on Computational Intelligence and Design (ISCID) , pp. 219 - 222 , doi: 10.1109\/ISCID.2016.2059. 10.1109\/ISCID.2016.2059 X. Wang and X. Sun (2016). An Improved Weighted Naive Bayesian Classification Algorithm Based on Multivariable Linear Regression Model. 2016 9th International Symposium on Computational Intelligence and Design (ISCID), pp. 219-222, doi: 10.1109\/ISCID.2016.2059."},{"key":"e_1_3_2_1_15_1","first-page":"1188","volume-title":"2021 5th International Conference on Computing Methodologies and Communication (ICCMC)","author":"K.","year":"2021","unstructured":"K. RAMESH, M. A. BENNET, J. VEERAPPAN and P. RENJITH ( 2021 ). Performance Metric System for Malicious URL Data using Revised Random Forest Algorithm . 2021 5th International Conference on Computing Methodologies and Communication (ICCMC) , pp. 1188 - 1191 , doi: 10.1109\/ICCMC51019.2021.9418480. 10.1109\/ICCMC51019.2021.9418480 K. RAMESH, M. A. BENNET, J. VEERAPPAN and P. RENJITH (2021). Performance Metric System for Malicious URL Data using Revised Random Forest Algorithm. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 1188-1191, doi: 10.1109\/ICCMC51019.2021.9418480."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.97"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2018.8401597"},{"key":"e_1_3_2_1_18_1","article-title":"URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models","volume":"29","author":"R.","year":"2021","unstructured":"Afzal, S., Asim, M., Javed, A. R. ( 2021 ). URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models . J Netw Syst Manage 29 , 21 (2021). https:\/\/doi.org\/10.1007\/s10922-021-09587-8. 10.1007\/s10922-021-09587-8 Afzal, S., Asim, M., Javed, A.R. (2021). URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models. J Netw Syst Manage 29, 21 (2021). https:\/\/doi.org\/10.1007\/s10922-021-09587-8.","journal-title":"J Netw Syst Manage"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIC51217.2021.9369758"},{"key":"e_1_3_2_1_20_1","unstructured":"Alexa http:\/\/www.alexa.cn\/  Alexa http:\/\/www.alexa.cn\/"}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2021","location":"Sanya China"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487132","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:10Z","timestamp":1750183810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":20,"alternative-id":["10.1145\/3487075.3487132","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487132","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}