{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T06:44:16Z","timestamp":1747205056108,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323798","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T17:11:35Z","timestamp":1523466695000},"page":"468-473","source":"Crossref","is-referenced-by-count":5,"title":["Classification of Exploit-Kit behaviors via machine learning approach"],"prefix":"10.23919","author":[{"given":"Sukritta","family":"Harnmetta","sequence":"first","affiliation":[]},{"given":"Sudsanguan","family":"Ngamsuriyaroj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"journal-title":"The Bro Network Security Monitor","year":"2014","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50032-3"},{"key":"ref13","article-title":"Keki","author":"fayyad","year":"1993","journal-title":"Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning"},{"journal-title":"Rules of Machine Learning Best Practices for ML Engineering","year":"2017","author":"zinkevich","key":"ref14"},{"journal-title":"RapidMinerDocumentation","year":"2017","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.023"},{"key":"ref3","article-title":"Kizzle: A signature compiler for exploit kits","author":"stock","year":"2015","journal-title":"International Conference on Dependable Systems and Networks (DSN)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557575"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.17"},{"key":"ref8","article-title":"Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces","author":"perdisci","year":"2010","journal-title":"NSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2014.21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-642-36563-8_13","article-title":"Anatomy of exploit kits","volume":"7781","author":"kotov","year":"2013","journal-title":"Engineering Secure Software and Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323798.pdf?arnumber=8323798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:11:34Z","timestamp":1598235094000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323798","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}