{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:54:08Z","timestamp":1773392048741,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2015icp0027","type":"journal-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T22:20:57Z","timestamp":1459462857000},"page":"873-882","source":"Crossref","is-referenced-by-count":23,"title":["Automating URL Blacklist Generation with Similarity Search Approach"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Bo","family":"SUN","sequence":"first","affiliation":[{"name":"Dept. of Communication Engineering, Waseda University"}]},{"given":"Mitsuaki","family":"AKIYAMA","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, NTT Corporation"}]},{"given":"Takeshi","family":"YAGI","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, NTT Corporation"}]},{"given":"Mitsuhiro","family":"HATADA","sequence":"additional","affiliation":[{"name":"Dept. of Communication Engineering, Waseda University"}]},{"given":"Tatsuya","family":"MORI","sequence":"additional","affiliation":[{"name":"Dept. of Communication Engineering, Waseda University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] KASPERSKY, \u201cKASPERSKY SECURITY BULLETIN 2013.\u201d http:\/\/report.kaspersky.com\/"},{"key":"2","unstructured":"[2] Internetlivestats, \u201cGoogle Search Statistics-internet live stats.\u201d http:\/\/www.internetlivestats.com\/google-search-statistics\/"},{"key":"3","unstructured":"[3] M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster,\u201cBuilding a dynamic reputation system for DNS,\u201d Proc. 19th USENIX Security Symposium, pp.273-290, Washington, DC, USA, Aug. 2010."},{"key":"4","unstructured":"[4] H. Choi, B.B. Zhu, and H. Lee, \u201cDetecting malicious web links and identifying their attack types,\u201d Proc. USENIX WebApps, 2011."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] J. Ma, L.K. Saul, S. Savage, and G.M. Voelker, \u201cBeyond blacklists: learning to detect malicious web sites from suspicious urls,\u201d Proc. KDD, pp.1245-1254, 2009.","DOI":"10.1145\/1557019.1557153"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] B. Eshete, A. Villafiorita, and K. Weldemariam, \u201cBinspect: Holistic analysis and detection of malicious web pages,\u201d Proc. SecureComm, pp.149-166, 2013.","DOI":"10.1007\/978-3-642-36883-7_10"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] L. Xu, Z. Zhan, S. Xu, and K. Ye, \u201cCross-layer detection of malicious websites,\u201d Proc. CODASPY, pp.141-152, 2013.","DOI":"10.1145\/2435349.2435366"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] D. Canali, M. Cova, G. Vigna, and C. Kruegel, \u201cProphiler: a fast filter for the large-scale detection of malicious web pages,\u201d Proc. WWW, pp.197-206, 2011.","DOI":"10.1145\/1963405.1963436"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] D. Chiba, K. Tobe, T. Mori, and S. Goto, \u201cDetecting malicious websites by learning IP address features,\u201d 12th IEEE\/IPSJ International Symposium on Applications and the Internet, SAINT 2012, Izmir, Turkey, July 16-20, 2012, pp.29-39, 2012.","DOI":"10.1109\/SAINT.2012.14"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] J. Ma, L.K. Saul, S. Savage, and G.M. Voelker, \u201cIdentifying suspicious urls: an application of large-scale online learning,\u201d Proc. ICML, pp.681-688, 2009.","DOI":"10.1145\/1553374.1553462"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] L. Invernizzi and P.M. Comparetti, \u201cEvilseed: A guided approach to finding malicious web pages,\u201d Proc. IEEE Symposium on Security and Privacy, pp.428-442, 2012.","DOI":"10.1109\/SP.2012.33"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Akiyama, T. Yagi, and M. Itoh, \u201cSearching structural neighborhood of malicious urls to improve blacklisting,\u201d 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp.1-10, 2011.","DOI":"10.1109\/SAINT.2011.11"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] M. Akiyama, M. Iwamura, Y. Kawakoya, K. Aoki, and M. Itoh, \u201cDesign and implementation of high interaction client honeypot for drive-by-download attacks,\u201d IEICE Transactions, vol.93-B, no.5, pp.1131-1139, 2010.","DOI":"10.1587\/transcom.E93.B.1131"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] K. Aoki, T. Yagi, M. Iwamura, and M. Itoh, \u201cControlling malware http communications in dynamic analysis system using search engine,\u201d Proc. IEEE CSS, pp.1-6, 2011.","DOI":"10.1109\/CSS.2011.6058563"},{"key":"15","unstructured":"[15] Salvatore Sanfilippo, \u201cHping3.\u201d http:\/\/www.hping.org\/hping3.html"},{"key":"16","unstructured":"[16] \u201cZMap.\u201d https:\/\/zmap.io\/"},{"key":"17","unstructured":"[17] Farsight Security, Inc., \u201cDNSDB.\u201d https:\/\/www.dnsdb.info"},{"key":"18","unstructured":"[18] NLnet Labs, \u201cUnbound.\u201d https:\/\/www.unbound.net"},{"key":"19","unstructured":"[19] Apache, \u201cApache Nutch.\u201d http:\/\/nutch.apache.org"},{"key":"20","unstructured":"[20] ORACLE, \u201cMySQL.\u201d http:\/\/www.mysql.com"},{"key":"21","unstructured":"[21] Google Sets. http:\/\/en.wikipedia.org\/wiki\/List_of_Google_products#Discontinued_in_2011"},{"key":"22","unstructured":"[22] Z. Ghahramani and K.A. Heller, \u201cBayesian sets,\u201d Proc. NIPS, 2005."},{"key":"23","unstructured":"[23] Virustotal, \u201cVirustotal online service.\u201d https:\/\/www.virustotal.com\/ja\/"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/4\/E99.D_2015ICP0027\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T04:46:06Z","timestamp":1567745166000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/4\/E99.D_2015ICP0027\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2015icp0027","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}