{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T23:58:20Z","timestamp":1722211100004},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["15203120","15218919","15222118"],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072390"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1016\/j.jisa.2021.102967","type":"journal-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T16:59:41Z","timestamp":1631897981000},"page":"102967","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["SeizeMaliciousURL: A novel learning approach to detect malicious URLs"],"prefix":"10.1016","volume":"62","author":[{"given":"Dipankar Kumar","family":"Mondal","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2870-8137","authenticated-orcid":false,"given":"Bikash Chandra","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9008-2112","authenticated-orcid":false,"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shivazi","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Zulfikar","family":"Alom","sequence":"additional","affiliation":[]},{"given":"Mohammad Abdul","family":"Azim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2021.102967_b1","series-title":"2008 3rd international conference on malicious and unwanted software","first-page":"57","article-title":"Shades of grey: On the effectiveness of reputation-based \u201cblacklists\u201d","author":"Sinha","year":"2008"},{"key":"10.1016\/j.jisa.2021.102967_b2","series-title":"Malicious URL detection using machine learning: A survey","author":"Sahoo","year":"2017"},{"key":"10.1016\/j.jisa.2021.102967_b3","series-title":"2012 IEEE symposium on security and privacy","first-page":"443","article-title":"Rozzle: De-cloaking internet malware","author":"Kolbitsch","year":"2012"},{"key":"10.1016\/j.jisa.2021.102967_b4","series-title":"2015 international conference on high performance computing & simulation","first-page":"195","article-title":"A lexical approach for classifying malicious URLs","author":"Darling","year":"2015"},{"issue":"4","key":"10.1016\/j.jisa.2021.102967_b5","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","article-title":"Phishing detection: A literature survey","volume":"15","author":"Khonji","year":"2013","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.1016\/j.jisa.2021.102967_b6","article-title":"Method for detecting a malicious domain by using whois and dns features","volume":"74","author":"Kuyama","year":"2016"},{"key":"10.1016\/j.jisa.2021.102967_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2020.101494","article-title":"Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods","author":"Li","year":"2020","journal-title":"Inf Syst"},{"key":"10.1016\/j.jisa.2021.102967_b8","series-title":"International Conference on Network and System Security","first-page":"467","article-title":"Detecting malicious urls using lexical analysis","author":"Mamun","year":"2016"},{"key":"10.1016\/j.jisa.2021.102967_b9","series-title":"2014 6th International Conference on Information Technology and Electrical Engineering","first-page":"1","article-title":"Automated document classification for news article in bahasa Indonesia based on term frequency inverse document frequency (TF-IDF) approach","author":"Hakim","year":"2014"},{"issue":"3","key":"10.1016\/j.jisa.2021.102967_b10","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1145\/212094.212114","article-title":"Overfitting and undercomputing in machine learning","volume":"27","author":"Dietterich","year":"1995","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jisa.2021.102967_b11","series-title":"Large-scale automatic classification of phishing pages","author":"Whittaker","year":"2010"},{"key":"10.1016\/j.jisa.2021.102967_b12","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","article-title":"Machine learning based phishing detection from URLs","volume":"117","author":"Sahingoz","year":"2019","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2021.102967_b13","series-title":"2020 16th IEEE international colloquium on signal processing & its applications","first-page":"111","article-title":"Detecting phishing website using machine learning","author":"Alkawaz","year":"2020"},{"key":"10.1016\/j.jisa.2021.102967_b14","doi-asserted-by":"crossref","unstructured":"Zhang Y, Hong JI, Cranor LF. Cantina: A content-based approach to detecting phishing web sites. In: Proceedings of the 16th international conference on world wide web. 2007. p. 639\u201348.","DOI":"10.1145\/1242572.1242659"},{"key":"10.1016\/j.jisa.2021.102967_b15","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1016\/j.procs.2020.04.118","article-title":"PhishSKaPe: A content based approach to escape phishing attacks","volume":"171","author":"Jain","year":"2020","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"10.1016\/j.jisa.2021.102967_b16","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s12652-019-01311-4","article-title":"CatchPhish: Detection of phishing websites by inspecting URLs","volume":"11","author":"Rao","year":"2020","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10.1016\/j.jisa.2021.102967_b17","doi-asserted-by":"crossref","first-page":"83425","DOI":"10.1109\/ACCESS.2020.2991403","article-title":"PhishHaven\u2014an efficient real-time AI phishing URLs detection system","volume":"8","author":"Sameen","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2021.102967_b18","doi-asserted-by":"crossref","unstructured":"Ma J, Saul LK, Savage S, Voelker GM. Identifying suspicious URLs: An application of large-scale online learning. In: Proceedings of the 26th annual international conference on machine learning. 2009. p. 681\u20138.","DOI":"10.1145\/1553374.1553462"},{"issue":"3","key":"10.1016\/j.jisa.2021.102967_b19","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.3233\/JIFS-169429","article-title":"Evaluating deep learning approaches to characterize and classify malicious URL\u2019s","volume":"34","author":"Vinayakumar","year":"2018","journal-title":"J Intell Fuzzy Systems"},{"key":"10.1016\/j.jisa.2021.102967_b20","series-title":"2017 APWG symposium on electronic crime research","first-page":"1","article-title":"Classifying phishing URLs using recurrent neural networks","author":"Bahnsen","year":"2017"},{"key":"10.1016\/j.jisa.2021.102967_b21","series-title":"eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys","author":"Saxe","year":"2017"},{"key":"10.1016\/j.jisa.2021.102967_b22","series-title":"Malicious URL detection using deep learning","author":"KP","year":"2020"},{"key":"10.1016\/j.jisa.2021.102967_b23","series-title":"2018 IEEE\/ACM international conference on advances in social networks analysis and mining","first-page":"1191","article-title":"Detecting spam accounts on Twitter","author":"Alom","year":"2018"},{"key":"10.1016\/j.jisa.2021.102967_b24","article-title":"A deep learning model for Twitter spam detection","volume":"18","author":"Alom","year":"2020","journal-title":"Online Soc. Netw. Media"},{"key":"10.1016\/j.jisa.2021.102967_b25","first-page":"1","article-title":"Identification of malicious activities in industrial internet of things based on deep learning models","volume":"41","author":"Muna","year":"2018","journal-title":"J. Inform. Secur. Appl."},{"key":"10.1016\/j.jisa.2021.102967_b26","first-page":"80","article-title":"Cyber intrusion detection by combined feature selection algorithm","volume":"44","author":"Mohammadi","year":"2019","journal-title":"J. Inform. Secur. Appl."},{"key":"10.1016\/j.jisa.2021.102967_b27","series-title":"2017 IEEE 37th International conference on distributed computing systems","first-page":"151","article-title":"Learning privacy habits of pds owners","author":"Singh","year":"2017"},{"key":"10.1016\/j.jisa.2021.102967_b28","article-title":"Privacy-aware personal data storage (P-PDS): Learning how to protect user privacy from external applications","author":"Singh","year":"2019","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2021.102967_b29","series-title":"2019 IEEE international conference on services computing","first-page":"100","article-title":"Helping users managing context-based privacy preferences","author":"Alom","year":"2019"},{"key":"10.1016\/j.jisa.2021.102967_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102240","article-title":"Knapsack graph-based privacy checking for smart environments","volume":"105","author":"Alom","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jisa.2021.102967_b31","series-title":"2016 IEEE 17th international conference on information reuse and integration","first-page":"40","article-title":"A risk-benefit driven architecture for personal data release","author":"Singh","year":"2016"},{"key":"10.1016\/j.jisa.2021.102967_b32","first-page":"26","article-title":"Efficient suspicious URL filtering based on reputation","volume":"20","author":"Chen","year":"2015","journal-title":"J. Inform. Secur. Appl."},{"key":"10.1016\/j.jisa.2021.102967_b33","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.cose.2017.11.007","article-title":"Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach","volume":"73","author":"Chen","year":"2018","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jisa.2021.102967_b34","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.jnca.2018.02.021","article-title":"An ensemble learning based approach for impression fraud detection in mobile advertising","volume":"112","author":"Haider","year":"2018","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.jisa.2021.102967_b35","first-page":"110","article-title":"Ensemble learning","volume":"2","author":"Dietterich","year":"2002"},{"issue":"2","key":"10.1016\/j.jisa.2021.102967_b36","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00058655","article-title":"Bagging predictors","volume":"24","author":"Breiman","year":"1996","journal-title":"Mach Learn"},{"key":"10.1016\/j.jisa.2021.102967_b37","series-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation","author":"Powers","year":"2011"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212621001794?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212621001794?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T16:33:29Z","timestamp":1683045209000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212621001794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":37,"alternative-id":["S2214212621001794"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2021.102967","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SeizeMaliciousURL: A novel learning approach to detect malicious URLs","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2021.102967","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"102967"}}