{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T06:44:06Z","timestamp":1776840246678,"version":"3.51.2"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976223","type":"print"},{"value":"9783031976230","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97623-0_5","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:21:39Z","timestamp":1752139299000},"page":"86-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: Exploring the\u00a0Zero-Shot Potential of\u00a0Large Language Models for\u00a0Detecting Algorithmically Generated Domains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9308-5688","authenticated-orcid":false,"given":"Tom\u00e1s","family":"Pelayo-Benedet","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7982-0359","authenticated-orcid":false,"given":"Ricardo J.","family":"Rodr\u00edguez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4699-3007","authenticated-orcid":false,"given":"Carlos H.","family":"Ga\u00f1\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"5_CR1","unstructured":"Anthropic: Sonnet 3.5 and Haiku 3.5 (2024). https:\/\/www.anthropic.com. Accessed 1 Dec 2024"},{"key":"5_CR2","unstructured":"Google: Gemini Pro 1.5, Gemini Flash 1.5 and Gemini Flash 8b 1.5. https:\/\/deepmind.google\/technologies\/gemini\/. Accessed 1 Dec 2024"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Marvin, G., Hellen, N., Jjingo, D., Nakatumba-Nabende, J.: Prompt engineering in large language models. In: Jacob, I.J., Piramuthu, S., Falkowski-Gilski, P. (eds.) Data Intelligence and Cognitive Informatics, pp. 387\u2013402. Springer, Singapore (2024)","DOI":"10.1007\/978-981-99-7962-2_30"},{"key":"5_CR4","unstructured":"MistralAI: Mistral AI Large and Mistral AI small (2024). https:\/\/mistral.ai\/. Accessed 1 Dec 2024"},{"key":"5_CR5","unstructured":"MITRE: Dynamic Resolution: Domain Generation Algorithms. https:\/\/attack.mitre.org\/techniques\/T1568\/002\/. Accessed 23 Aug 2023"},{"key":"5_CR6","unstructured":"OpenAI: GPT-4o and GPT-4o-mini (2024). https:\/\/openai.com. Accessed 1 Dec 2024"},{"key":"5_CR7","unstructured":"Plohmann, D., Yakdan, K., Klatt, M., Bader, J., Gerhards-Padilla, E.: A comprehensive measurement study of domain generating malware. In: 25th USENIX Security Symposium, pp. 263\u2013278. USENIX Association, August 2016"},{"key":"5_CR8","unstructured":"Pochat, V.L., Goethem, T.V., Tajalizadehkhoob, S., Korczynski, M., Joosen, W.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: 26th Annual Network and Distributed System Security Symposium, San Diego, California, USA, 24\u201327 February 2019. The Internet Society (2019)"},{"key":"5_CR9","first-page":"7","volume":"9","author":"PA Porras","year":"2009","unstructured":"Porras, P.A., Sa\u00efdi, H., Yegneswaran, V.: A foray into Conficker\u2019s logic and rendezvous points. LEET 9, 7 (2009)","journal-title":"LEET"},{"key":"5_CR10","unstructured":"Tranco: Tranco List (2024). https:\/\/tranco-list.eu\/. Accessed 15 Aug 2024"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97623-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:21:45Z","timestamp":1752139305000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97623-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976223","9783031976230"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97623-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}