{"id":"https://openalex.org/W2539447975","doi":"https://doi.org/10.1109/malware.2014.6999407","title":"Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud","display_name":"Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2539447975","doi":"https://doi.org/10.1109/malware.2014.6999407","mag":"2539447975"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2014.6999407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010616205","display_name":"Ferenc Leitold","orcid":null},"institutions":[{"id":"https://openalex.org/I96221595","display_name":"College of Duna\u00fajv\u00e1ros","ror":"https://ror.org/05x0g9h76","country_code":"HU","type":"education","lineage":["https://openalex.org/I96221595"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Ferenc Leitold","raw_affiliation_strings":["College of Duna\u00fajv\u00e1ros, Veszprog Ltd., Hungary"],"affiliations":[{"raw_affiliation_string":"College of Duna\u00fajv\u00e1ros, Veszprog Ltd., Hungary","institution_ids":["https://openalex.org/I96221595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035524983","display_name":"Anthony Arrott","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anthony Arrott","raw_affiliation_strings":["Security Analytics, Veszprog Labs, USA"],"affiliations":[{"raw_affiliation_string":"Security Analytics, Veszprog Labs, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fernando C. Colon Osorio","raw_affiliation_strings":["Wireless Systems Security Research Laboratory, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Systems Security Research Laboratory, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010616205"],"corresponding_institution_ids":["https://openalex.org/I96221595"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43800402,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"40","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7316570281982422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7171888947486877},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6721413135528564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5101493000984192},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.441165566444397},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4243800640106201},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.4198029041290283},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1589665710926056},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1168515682220459},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09989011287689209}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7316570281982422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7171888947486877},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6721413135528564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5101493000984192},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.441165566444397},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4243800640106201},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.4198029041290283},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1589665710926056},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1168515682220459},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09989011287689209},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2014.6999407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2011424284","https://openalex.org/W2039529994"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362","https://openalex.org/W4388020458"],"abstract_inverted_index":{"Traditionally,":[0],"the":[1,21,37,47,51,82,85,94,103,120,124,188,200,206,216,242,279,288,301,320,328,358,382],"protection":[2,289,332,360],"provided":[3,290,333,361],"by":[4,226,362],"3rd":[5,363],"party":[6,364],"anti-Malware":[7,365],"endpoint":[8],"security":[9,283],"products":[10,366],"is":[11,18,69,209],"measured":[12],"using":[13],"a":[14,44,58,63,72,114,129,148,171,191,266,271,338,371,376],"sample":[15],"set":[16],"that":[17,27,102,112,122,293,318,340,357],"representative":[19],"of":[20,24,46,60,65,76,84,190,202,244,281,300,314,330,353,373,378],"prevalent":[22],"universe":[23],"attacks":[25],"at":[26],"point":[28],"in":[29,36,247,269],"time":[30],"(malicious":[31],"URLs":[32],"and/or":[33,384],"malicious":[34],"files":[35,78],"world).":[38],"The":[39,67],"methodology":[40],"used":[41,276],"for":[42,62],"such":[43,77,113,257,265],"selection":[45,75,104,115],"Malware":[48,153,292],"attack":[49,154,228,302],"samples,":[50],"so-called":[52],"Stimulus":[53,193,207],"Workload":[54,208],"(SW),":[55],"has":[56],"been":[57],"matter":[59],"controversy":[61],"number":[64],"years.":[66],"reason":[68],"simple.":[70],"Given":[71],"carefully":[73],"crafted":[74],"or":[79,166,176],"URLs,":[80],"then,":[81],"results":[83,352],"measurements":[86],"can":[87],"varied":[88],"drastically":[89],"favoring":[90],"one":[91,256],"vendor":[92],"versus":[93],"other.":[95],"In":[96,185],"[1],":[97,186],"Colon":[98],"Osorio,":[99],"et.al.":[100],"argued":[101],"process":[105],"must":[106,116],"be":[107,158,168],"strictly":[108],"regulated,":[109],"and":[110,141,182,238,275,326],"further,":[111],"take":[117,212],"into":[118,213],"account":[119,214],"fact":[121],"amongst":[123,319],"samples":[125,155,203,229],"selected,":[126],"some":[127,152],"pose":[128],"greater":[130],"threat":[131],"to":[132,146,170,211,255,277,337,347,375],"users":[133],"than":[134],"others,":[135],"as":[136,205,298],"they":[137],"are":[138,143,224,308],"more":[139,144],"widespread,":[140],"hence":[142],"likely":[145],"affect":[147,163],"given":[149],"user.":[150],"Further,":[151,351],"may":[156],"only":[157,167],"found":[159,317],"on":[160,231,381],"specific":[161,164,258],"websites,":[162],"countries/regions,":[165],"relevant":[169],"particular":[172],"operating":[173],"system":[174],"version":[175],"interface":[177],"languages":[178],"(English,":[179],"German,":[180],"Chinese,":[181],"so":[183],"forth).":[184],"[2],":[187],"idea":[189],"Customizable":[192],"Workloads,":[194],"(CSW)":[195],"was":[196,273,367],"first":[197],"suggested,":[198],"whereas,":[199],"collection":[201],"selected":[204],"required":[210],"all":[215],"elements":[217],"described":[218],"above.":[219],"Within":[220,241],"this":[221,245,248],"context,":[222],"CSWs":[223,307],"created":[225,274],"filtering":[227],"base":[230],"prevalence,":[232],"geographic":[233],"regions,":[234],"customer":[235],"application":[236,259],"environments,":[237],"other":[239],"factors.":[240],"context":[243],"methodology,":[246],"manuscript":[249],"we":[250,286,316,341],"will":[251,342],"pay":[252],"special":[253],"attention":[254],"environment,":[260],"primarily,":[261],"Social":[262,296,305,321,385],"Networks.":[263],"With":[264],"target":[267],"environment":[268],"mind,":[270],"CSW":[272],"evaluate":[278],"performance":[280],"end-point":[282],"products.":[284],"Basically,":[285],"examine":[287],"against":[291],"uses":[294],"internet":[295],"Networks":[297,322],"part":[299],"vector.":[303],"When":[304],"Network":[306,386],"used,":[309],"together":[310],"with":[311],"differential":[312],"metrics":[313],"effectiveness,":[315],"studied":[323],"(Facebook,":[324],"Google+,":[325],"Twitter)":[327],"amount":[329],"inherent":[331],"ranged":[334],"from":[335,370],"negligible":[336],"level":[339],"call":[343],"modest":[344],"self-protection":[345],"(0%":[346],"18%":[348],"prevention":[349],"rate).":[350],"our":[354],"evaluation":[355],"showed":[356],"supplemental":[359],"erratic,":[368],"ranging":[369],"low":[372],"0%":[374],"high":[377],"93%":[379],"depending":[380],"product":[383],"combination.":[387]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
