{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:00Z","timestamp":1750220340311,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508088","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"100-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Malicious URL Detection Using Streaming Feature Selection"],"prefix":"10.1145","author":[{"given":"Rawan","family":"AlTalhi","sequence":"first","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]},{"given":"Malik Najmus","family":"Saqib","sequence":"additional","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]},{"given":"Usman","family":"Saeed","sequence":"additional","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]},{"given":"Ahmed","family":"Alghamdi","sequence":"additional","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Detecting Malicious URL. In 2020 International Conference on Computing and Information Technology (ICCIT-1441)","author":"Alkhudair Fatimah","year":"2020","unstructured":"Fatimah Alkhudair , Mada Alassaf , Rehan\u00a0Ullah Khan , and Shouq Alfarraj . 2020 . Detecting Malicious URL. In 2020 International Conference on Computing and Information Technology (ICCIT-1441) . IEEE, 1\u20135. Fatimah Alkhudair, Mada Alassaf, Rehan\u00a0Ullah Khan, and Shouq Alfarraj. 2020. Detecting Malicious URL. In 2020 International Conference on Computing and Information Technology (ICCIT-1441). IEEE, 1\u20135."},{"key":"e_1_3_2_1_2_1","unstructured":"Noura AlNuaimi Mohammad\u00a0Mehedy Masud Mohamed\u00a0Adel Serhani and Nazar Zaki. 2019. Streaming feature selection algorithms for big data: A survey. Applied Computing and Informatics(2019).  Noura AlNuaimi Mohammad\u00a0Mehedy Masud Mohamed\u00a0Adel Serhani and Nazar Zaki. 2019. Streaming feature selection algorithms for big data: A survey. Applied Computing and Informatics(2019)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031125"},{"volume-title":"International Conference on Machine Learning, Image Processing, Network Security and Data Sciences","author":"Banik Bireswar","key":"e_1_3_2_1_4_1","unstructured":"Bireswar Banik and Abhijit Sarma . 2020. Lexical Feature Based Feature Selection and Phishing URL Classification Using Machine Learning Techniques . In International Conference on Machine Learning, Image Processing, Network Security and Data Sciences . Springer , 93\u2013105. Bireswar Banik and Abhijit Sarma. 2020. Lexical Feature Based Feature Selection and Phishing URL Classification Using Machine Learning Techniques. In International Conference on Machine Learning, Image Processing, Network Security and Data Sciences. Springer, 93\u2013105."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2017.8384155"},{"key":"e_1_3_2_1_6_1","volume-title":"URL dataset (ISCX-URL2016). https:\/\/www.unb.ca\/cic\/datasets\/url-2016.html Last accessed","author":"Canadian\u00a0Institute for Cybersecurity. 2016.","year":"2021","unstructured":"Canadian\u00a0Institute for Cybersecurity. 2016. URL dataset (ISCX-URL2016). https:\/\/www.unb.ca\/cic\/datasets\/url-2016.html Last accessed 24 November 2021 . Canadian\u00a0Institute for Cybersecurity. 2016. URL dataset (ISCX-URL2016). https:\/\/www.unb.ca\/cic\/datasets\/url-2016.html Last accessed 24 November 2021."},{"volume-title":"Multimedia Security","author":"Gandotra Ekta","key":"e_1_3_2_1_7_1","unstructured":"Ekta Gandotra and Deepak Gupta . 2021. An Efficient Approach for Phishing Detection using Machine Learning . In Multimedia Security . Springer , 239\u2013253. Ekta Gandotra and Deepak Gupta. 2021. An Efficient Approach for Phishing Detection using Machine Learning. In Multimedia Security. Springer, 239\u2013253."},{"key":"e_1_3_2_1_8_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 0347\u20130352","author":"Mohammd\u00a0Junaid Khan Hafiz","year":"2019","unstructured":"Hafiz Mohammd\u00a0Junaid Khan , Quamar Niyaz , Vijay\u00a0 K Devabhaktuni , Site Guo , and Umair Shaikh . 2019 . Identifying generic features for malicious url detection system. In 2019 IEEE 10th Annual Ubiquitous Computing , Electronics & Mobile Communication Conference (UEMCON). IEEE, 0347\u20130352 . Hafiz Mohammd\u00a0Junaid Khan, Quamar Niyaz, Vijay\u00a0K Devabhaktuni, Site Guo, and Umair Shaikh. 2019. Identifying generic features for malicious url detection system. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 0347\u20130352."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8821879"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2018-0002"},{"key":"e_1_3_2_1_12_1","unstructured":"Doyen Sahoo Chenghao Liu and Steven\u00a0CH Hoi. 2017. Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179(2017).  Doyen Sahoo Chenghao Liu and Steven\u00a0CH Hoi. 2017. Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179(2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"Online feature selection with streaming features","author":"Wu Xindong","year":"2012","unstructured":"Xindong Wu , Kui Yu , Wei Ding , Hao Wang , and Xingquan Zhu . 2012. Online feature selection with streaming features . IEEE transactions on pattern analysis and machine intelligence 35, 5( 2012 ), 1178\u20131192. Xindong Wu, Kui Yu, Wei Ding, Hao Wang, and Xingquan Zhu. 2012. Online feature selection with streaming features. IEEE transactions on pattern analysis and machine intelligence 35, 5(2012), 1178\u20131192."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.08.026"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508088","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":14,"alternative-id":["10.1145\/3508072.3508088","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508088","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}