{"id":"https://openalex.org/W2130799864","doi":"https://doi.org/10.1145/2808797.2809281","title":"Real-time Classification of Malicious URLs on Twitter using Machine Activity Data","display_name":"Real-time Classification of Malicious URLs on Twitter using Machine Activity Data","publication_year":2015,"publication_date":"2015-08-25","ids":{"openalex":"https://openalex.org/W2130799864","doi":"https://doi.org/10.1145/2808797.2809281","mag":"2130799864"},"language":"en","primary_location":{"id":"doi:10.1145/2808797.2809281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808797.2809281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2808797.2809281","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2808797.2809281","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090436792","display_name":"Pete Burnap","orcid":"https://orcid.org/0000-0003-0396-633X"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Pete Burnap","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065308354","display_name":"Amir Javed","orcid":"https://orcid.org/0000-0001-9761-0945"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amir Javed","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021973291","display_name":"Omer Rana","orcid":"https://orcid.org/0000-0003-3597-2646"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Omer F. Rana","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047755763","display_name":"Malik Shahzad Kaleem Awan","orcid":null},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Malik S. Awan","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090436792"],"corresponding_institution_ids":["https://openalex.org/I79510175"],"apc_list":null,"apc_paid":null,"fwci":10.7047,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.9804079,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"970","last_page":"977"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8473219871520996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8359560370445251},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8079908490180969},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5363608002662659},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.513340175151825},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.48456206917762756},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4389571249485016},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42846226692199707},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42664772272109985},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3120376467704773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30211132764816284},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12533432245254517}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8473219871520996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359560370445251},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8079908490180969},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5363608002662659},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.513340175151825},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.48456206917762756},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4389571249485016},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42846226692199707},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42664772272109985},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3120376467704773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30211132764816284},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12533432245254517},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2808797.2809281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808797.2809281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2808797.2809281","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015","raw_type":"proceedings-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:76190","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.1145/2808797.2809281","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2808797.2809281","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2808797.2809281","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1559650014","display_name":null,"funder_award_id":"EP/K03345X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G1934935867","display_name":null,"funder_award_id":"Engineering and Physical Sciences R","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5178130810","display_name":"Identifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape","funder_award_id":"EP/K03345X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2130799864.pdf","grobid_xml":"https://content.openalex.org/works/W2130799864.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W40177048","https://openalex.org/W1519699895","https://openalex.org/W1590495275","https://openalex.org/W1752870744","https://openalex.org/W1970867218","https://openalex.org/W1973240391","https://openalex.org/W1986678144","https://openalex.org/W1990474689","https://openalex.org/W1993110238","https://openalex.org/W1994344180","https://openalex.org/W1996802155","https://openalex.org/W2013800079","https://openalex.org/W2025946986","https://openalex.org/W2055407442","https://openalex.org/W2074835059","https://openalex.org/W2077248027","https://openalex.org/W2101196063","https://openalex.org/W2107541186","https://openalex.org/W2111165162","https://openalex.org/W2124499489","https://openalex.org/W2138919872","https://openalex.org/W2159034832","https://openalex.org/W2159697678","https://openalex.org/W2160289821","https://openalex.org/W2163898372","https://openalex.org/W2166856041","https://openalex.org/W2209809854","https://openalex.org/W2398757235","https://openalex.org/W6669121539"],"related_works":["https://openalex.org/W4366249425","https://openalex.org/W2900235625","https://openalex.org/W2053293719","https://openalex.org/W3083187169","https://openalex.org/W2594153842","https://openalex.org/W2990396213","https://openalex.org/W2902215642","https://openalex.org/W2795052090","https://openalex.org/W3023846186","https://openalex.org/W3126185480"],"abstract_inverted_index":{"Massive":[0],"online":[1],"social":[2],"networks":[3],"with":[4,42,155,257],"hundreds":[5],"of":[6,8,29,137,196,222,251],"millions":[7],"active":[9],"users":[10,30],"are":[11,71],"increasingly":[12],"being":[13,140],"used":[14,256],"by":[15],"Cyber":[16,86],"criminals":[17,87],"to":[18,23,38,52,58,60,91,128,198,226,245,262],"spread":[19],"malicious":[20,93,103,131,234],"software":[21,235],"(malware)":[22],"exploit":[24,89],"vulnerabilities":[25],"on":[26,95,109,200,209],"the":[27,75,84,99,110,138,146,168,182,204,220,223,228,243],"machines":[28],"for":[31,50,97,242],"personal":[32],"gain.":[33],"Twitter":[34,159],"is":[35,48,77,101,114],"particularly":[36],"susceptible":[37],"such":[39],"activity":[40,150,191,232],"as,":[41],"its":[43],"140":[44],"character":[45],"limit,":[46],"it":[47,173],"common":[49],"people":[51],"include":[53],"URLs":[54,70,94,134,156],"in":[55],"their":[56],"tweets":[57],"link":[59],"more":[61],"detailed":[62],"information,":[63],"evidence,":[64],"news":[65],"reports":[66],"and":[67,132,171,207,233,237],"so":[68,74],"on.":[69],"often":[72],"shortened":[73],"endpoint":[76,100],"not":[78],"obvious":[79],"before":[80],"a":[81,102,117,124,163,210,214,239,259],"person":[82],"clicks":[83],"link.":[85],"can":[88,254],"this":[90,120],"propagate":[92],"Twitter,":[96],"which":[98],"server":[104],"that":[105,189,247],"performs":[106],"unwanted":[107],"actions":[108],"person's":[111],"machine.":[112],"This":[113],"known":[115],"as":[116],"drive-by-download.":[118],"In":[119],"paper":[121],"we":[122,218],"develop":[123],"machine":[125,149,190,231],"classification":[126],"system":[127],"distinguish":[129],"between":[130,230],"benign":[133],"within":[135],"seconds":[136],"URL":[139],"clicked":[141],"(i.e.":[142],"'real-time').":[143],"We":[144],"train":[145],"classifier":[147,244],"using":[148,174],"logs":[151,192],"created":[152],"while":[153],"interacting":[154],"extracted":[157],"from":[158,176,203,213],"data":[160,175,202,212,253],"collected":[161],"during":[162],"large":[164,178],"global":[165],"event":[166,180,206],"--":[167,170,181],"Superbowl":[169],"test":[172,211],"another":[177],"sporting":[179],"Cricket":[183],"World":[184],"Cup.":[185],"The":[186],"results":[187],"show":[188],"produce":[193],"precision":[194],"performances":[195],"up":[197],"0.975":[199],"training":[201,252],"first":[205],"0.747":[208],"second":[215],"event.":[216],"Furthermore,":[217],"examine":[219],"properties":[221],"learned":[224],"model":[225],"explain":[227],"relationship":[229],"behaviour,":[236],"build":[238],"learning":[240],"curve":[241],"illustrate":[246],"very":[248],"small":[249,260],"samples":[250],"be":[255],"only":[258],"detriment":[261],"performance.":[263]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
