{"id":"https://openalex.org/W4225434657","doi":"https://doi.org/10.1007/978-3-030-97777-1_41","title":"Using a Machine Learning Model for Malicious URL Type Detection","display_name":"Using a Machine Learning Model for Malicious URL Type Detection","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4225434657","doi":"https://doi.org/10.1007/978-3-030-97777-1_41"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-97777-1_41","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-97777-1_41","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kclpure.kcl.ac.uk/portal/en/publications/44278b48-e7ff-4570-8452-7efb6401bb52","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075329381","display_name":"Suet Ping Tung","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB","HK"],"is_corresponding":false,"raw_author_name":"Suet Ping Tung","raw_affiliation_strings":["HKU School of Professional and Continuing Education, Kowloon Bay, Kowloon, Hong Kong","University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK","HKU School of Professional and Continuing Education, Kowloon, Hong Kong","University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"HKU School of Professional and Continuing Education, Kowloon Bay, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"HKU School of Professional and Continuing Education, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109856694","display_name":"Ka Yan Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ka Yan Wong","raw_affiliation_strings":["HKU School of Professional and Continuing Education, Kowloon Bay, Kowloon, Hong Kong","HKU School of Professional and Continuing Education, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"HKU School of Professional and Continuing Education, Kowloon Bay, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"HKU School of Professional and Continuing Education, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010458580","display_name":"Ievgeniia Kuzminykh","orcid":"https://orcid.org/0000-0001-6917-4234"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]},{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]},{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["GB","UA"],"is_corresponding":true,"raw_author_name":"Ievgeniia Kuzminykh","raw_affiliation_strings":["Kharkiv National University of Radio Electronics, 14 Nauki avenue, Kharkiv, Ukraine","King\u2019s College London, Strand, London, WC2R 2LS, UK","Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","King\u2019s College London, London, UK"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Radio Electronics, 14 Nauki avenue, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205"]},{"raw_affiliation_string":"King\u2019s College London, Strand, London, WC2R 2LS, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I107158390"]},{"raw_affiliation_string":"King\u2019s College London, London, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079692899","display_name":"Taimur Bakhshi","orcid":"https://orcid.org/0000-0003-4750-7864"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Taimur Bakhshi","raw_affiliation_strings":["FAST National University of Computer and Emerging Sciences, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"FAST National University of Computer and Emerging Sciences, Lahore, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK","University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010458580"],"corresponding_institution_ids":["https://openalex.org/I107158390","https://openalex.org/I183935753","https://openalex.org/I8765205"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":5.0446,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.95568707,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"493","last_page":"505"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8876248598098755},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.7558503746986389},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6260044574737549},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5574884414672852},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.54679936170578},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5334330797195435},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49991917610168457},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4753182530403137},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4753032624721527},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3673383295536041},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21077662706375122},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08858627080917358}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8876248598098755},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.7558503746986389},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6260044574737549},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5574884414672852},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.54679936170578},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5334330797195435},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49991917610168457},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4753182530403137},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4753032624721527},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3673383295536041},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21077662706375122},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08858627080917358},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-97777-1_41","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-97777-1_41","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:kclpure.kcl.ac.uk:openaire/44278b48-e7ff-4570-8452-7efb6401bb52","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/44278b48-e7ff-4570-8452-7efb6401bb52","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tung, S P, Wong, K Y, Kuzminykh, I, Bakhshi, T & Ghita, B 2022, Using a Machine Learning Model for Malicious URL Type Detection. in Y Koucheryavy, S Balandin & S Andreev (eds), Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 21st International Conference, NEW2AN 2021, and 14th Conference, ruSMART 2021, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13158 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 493-505, 21st International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2021 and 14th Conference on Internet of Things and Smart Spaces, ruSMART 2021, Virtual, Online, 30/08/2021. https://doi.org/10.1007/978-3-030-97777-1_41","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/20582","is_oa":false,"landing_page_url":"https://pearl.plymouth.ac.uk/handle/10026.1/20582","pdf_url":null,"source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference"}],"best_oa_location":{"id":"pmh:oai:kclpure.kcl.ac.uk:openaire/44278b48-e7ff-4570-8452-7efb6401bb52","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/44278b48-e7ff-4570-8452-7efb6401bb52","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tung, S P, Wong, K Y, Kuzminykh, I, Bakhshi, T & Ghita, B 2022, Using a Machine Learning Model for Malicious URL Type Detection. in Y Koucheryavy, S Balandin & S Andreev (eds), Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 21st International Conference, NEW2AN 2021, and 14th Conference, ruSMART 2021, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13158 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 493-505, 21st International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2021 and 14th Conference on Internet of Things and Smart Spaces, ruSMART 2021, Virtual, Online, 30/08/2021. https://doi.org/10.1007/978-3-030-97777-1_41","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1985920648","https://openalex.org/W1993851562","https://openalex.org/W2070896531","https://openalex.org/W2100460448","https://openalex.org/W2112081648","https://openalex.org/W2142595254","https://openalex.org/W2160289821","https://openalex.org/W2361517492","https://openalex.org/W2481838472","https://openalex.org/W2489965879","https://openalex.org/W2528572867","https://openalex.org/W2889629536","https://openalex.org/W2911964244","https://openalex.org/W2963801581","https://openalex.org/W2998979401","https://openalex.org/W3007831685","https://openalex.org/W3113549393","https://openalex.org/W3117479037","https://openalex.org/W3126529034","https://openalex.org/W3128457420","https://openalex.org/W3154618681","https://openalex.org/W3199385162","https://openalex.org/W6821251975"],"related_works":["https://openalex.org/W2992107877","https://openalex.org/W2005813008","https://openalex.org/W2765435113","https://openalex.org/W2017968904","https://openalex.org/W4366990902","https://openalex.org/W4317732970","https://openalex.org/W4388550696","https://openalex.org/W4321636153","https://openalex.org/W4313289487","https://openalex.org/W4380681680"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
