{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:24Z","timestamp":1726003104427},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_43","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:07:56Z","timestamp":1544191676000},"page":"497-505","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malicious Domain Name Recognition Based on Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"Xiaodan","family":"Yan","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"4","key":"43_CR1","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/COMST.2015.2457491","volume":"17","author":"N Hoque","year":"2015","unstructured":"Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutor. 17(4), 2242\u20132270 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"43_CR2","doi-asserted-by":"publisher","unstructured":"Rossow, C.: Amplification hell: revisiting network protocols for DDoS abuse. In: Proceedings 2014 Network and Distributed System Security Symposium. Internet Society, Reston, VA (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23233","DOI":"10.14722\/ndss.2014.23233"},{"issue":"2","key":"43_CR3","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TNET.2010.2070845","volume":"19","author":"G Thatte","year":"2011","unstructured":"Thatte, G., Mitra, U., Heidemann, J.: Parametric methods for anomaly detection in aggregate traffic. IEEE\/ACM Trans. Netw. 19(2), 512\u2013525 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"43_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2","volume-title":"Supervised Sequence Labelling with Recurrent Neural Networks","author":"A Graves","year":"2012","unstructured":"Graves, A.: Supervised Sequence Labelling with Recurrent Neural Networks, vol. 385. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-24797-2"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Duffield, N., Haffner, P., Krishnamurthy, B., et al.: Rule-based anomaly detection on IP flows. In: INFOCOM, pp. 424\u2013432. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061947"},{"issue":"9","key":"43_CR6","first-page":"94","volume":"37","author":"T Chen","year":"2010","unstructured":"Chen, T., Xu, S., Zhang, C.: Risk assessment method for network security based on intrusion detection system. Comput. Sci. 37(9), 94\u201396 (2010)","journal-title":"Comput. Sci."},{"key":"43_CR7","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097\u20131105. Curran Associates Inc. (2012)"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Computer Vision and Pattern Recognition, pp. 770\u2013778. IEEE (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"11","key":"43_CR9","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process 45(11), 2673\u20132681 (1997)","journal-title":"IEEE Trans. Signal Process"},{"issue":"8","key":"43_CR10","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"43_CR11","unstructured":"Netlab 360 Homepage. https:\/\/data.netlab.360.com\/dga . Accessed 21 Sept 2018"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/978-3-642-37192-9_53","volume-title":"Applications of Evolutionary Computation","author":"F Haddadi","year":"2013","unstructured":"Haddadi, F., Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Malicious automatically generated domain name detection using stateful-SBB. In: Esparcia-Alc\u00e1zar, A.I. (ed.) EvoApplications 2013. LNCS, vol. 7835, pp. 529\u2013539. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37192-9_53"},{"key":"43_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-662-48683-2_27","volume-title":"Applications and Techniques in Information Security","author":"C Xiong","year":"2015","unstructured":"Xiong, C., Li, P., Zhang, P., Liu, Q., Tan, J.: MIRD: trigram-based Malicious URL detection Implanted with Random Domain name recognition. In: Niu, W., et al. (eds.) ATIS 2015. CCIS, vol. 557, pp. 303\u2013314. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48683-2_27"},{"issue":"2","key":"43_CR14","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/TPDS.2013.146","volume":"25","author":"A Jamdagni","year":"2014","unstructured":"Jamdagni, A., Jamdagni, A., He, X., et al.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447\u2013456 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"43_CR15","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2017","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., et al.: Design and evaluation of a real-time URL spam filtering service. In: Security and Privacy, pp. 447\u2013462. IEEE (2011)","DOI":"10.1109\/SP.2011.25"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T01:05:54Z","timestamp":1573088754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}