{"id":"https://openalex.org/W2038424968","doi":"https://doi.org/10.1145/2557547.2557575","title":"WebWinnow","display_name":"WebWinnow","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2038424968","doi":"https://doi.org/10.1145/2557547.2557575","mag":"2038424968"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079219412","display_name":"Birhanu Eshete","orcid":"https://orcid.org/0000-0002-2549-4030"},"institutions":[{"id":"https://openalex.org/I2277624104","display_name":"Fondazione Bruno Kessler","ror":"https://ror.org/01j33xk10","country_code":"IT","type":"facility","lineage":["https://openalex.org/I2277624104"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Birhanu Eshete","raw_affiliation_strings":["Fondazione Bruno Kessler, Trento, Italy","[Fondazione Bruno Kessler, Trento, (Italy)]"],"affiliations":[{"raw_affiliation_string":"Fondazione Bruno Kessler, Trento, Italy","institution_ids":["https://openalex.org/I2277624104"]},{"raw_affiliation_string":"[Fondazione Bruno Kessler, Trento, (Italy)]","institution_ids":["https://openalex.org/I2277624104"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058117020","display_name":"V. N. Venkatakrishnan","orcid":"https://orcid.org/0000-0002-1690-9185"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. N. Venkatakrishnan","raw_affiliation_strings":["University of Ilinois, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Ilinois, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079219412"],"corresponding_institution_ids":["https://openalex.org/I2277624104"],"apc_list":null,"apc_paid":null,"fwci":12.6226,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.98327353,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.992301344871521},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7932434678077698},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5943424701690674},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5316439270973206},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46249058842658997},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.4251970648765564},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26305848360061646},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11324521899223328}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.992301344871521},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7932434678077698},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5943424701690674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5316439270973206},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46249058842658997},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.4251970648765564},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26305848360061646},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11324521899223328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W619991674","https://openalex.org/W1970867218","https://openalex.org/W1987644478","https://openalex.org/W2082180526","https://openalex.org/W2095610745","https://openalex.org/W2102475112","https://openalex.org/W2111165162","https://openalex.org/W2296488620"],"related_works":["https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W4230824443","https://openalex.org/W4377970398","https://openalex.org/W3026018975","https://openalex.org/W2779961139","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W2763500028","https://openalex.org/W4240288358"],"abstract_inverted_index":{"Organized":[0],"cybercrime":[1],"on":[2,100,122,139],"the":[3,26,45,77,86,123,127,156],"Internet":[4],"is":[5,34,67,76,98,137,152],"proliferating":[6],"due":[7],"to":[8,61,73],"exploit":[9,38,51,70,94,104,117,163],"kits.":[10,95],"Attacks":[11],"launched":[12],"through":[13],"these":[14],"kits":[15,105,118,164],"include":[16],"drive-by-downloads,":[17],"spam":[18],"and":[19,90,129],"denial-of-service.":[20],"In":[21],"this":[22,140],"paper,":[23],"we":[24,53,107],"tackle":[25],"problem":[27],"of":[28,44,47,79,88,93,131,158],"detecting":[29],"whether":[30,63],"a":[31,64,110,132],"given":[32,65],"URL":[33,66],"hosted":[35,121,161],"by":[36,162],"an":[37,41,55,69],"kit.":[39,71],"Through":[40],"extensive":[42],"analysis":[43,87],"workflows":[46],"about":[48],"40":[49],"different":[50],"kits,":[52],"develop":[54],"approach":[56,75],"that":[57,82,106,119,136,150],"uses":[58],"machine":[59],"learning":[60],"detect":[62],"hosting":[68],"Central":[72],"our":[74],"design":[78,97,128],"distinguishing":[80],"features":[81],"are":[83],"drawn":[84,102],"from":[85,103],"attack-centric":[89],"self-defense":[91],"behaviors":[92],"This":[96],"based":[99,138],"observations":[101],"installed":[108],"in":[109,155],"laboratory":[111],"setting":[112],"as":[113,115],"well":[114],"live":[116],"were":[120],"Web.":[124],"We":[125],"discuss":[126],"implementation":[130],"system":[133],"called":[134],"WEBWINNOW":[135,151],"approach.":[141],"Extensive":[142],"experiments":[143],"with":[144,165],"real":[145],"world":[146],"malicious":[147,159],"URLs":[148,160],"reveal":[149],"highly":[153],"effective":[154],"detection":[157],"very":[166],"low":[167],"false-positives.":[168]},"counts_by_year":[{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":6},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
