{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:33:37Z","timestamp":1743024817844,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_51","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"656-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Transfer Learning Approach for Identification of Malicious Domain Names"],"prefix":"10.1007","author":[{"given":"R.","family":"Rajalakshmi","sequence":"first","affiliation":[]},{"given":"S.","family":"Ramraj","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ramesh Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"51_CR1","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-981-10-8476-8_6","volume-title":"Big Data in Engineering Applications","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Poornachandran, P., Soman, K.P.: Scalable framework for cyber threat situational awareness based on domain name systems data analysis. In: Roy, S.S., Samui, P., Deo, R., Ntalampiras, S. (eds.) Big Data in Engineering Applications. SBD, vol. 44, pp. 113\u2013142. Springer, Singapore (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-10-8476-8_6"},{"issue":"3","key":"51_CR2","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P.: Detecting malicious domain names using deep learning approaches at scale. J. Intell. Fuzzy Syst. 34(3), 1355\u20131367 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"3","key":"51_CR3","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3233\/JIFS-169423","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P., Sachin Kumar, S.: Evaluating deep learning approaches to characterize and classify the DGAs at scale. J. Intell. Fuzzy Syst. 34(3), 1265\u20131276 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"51_CR4","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P., Menon, P.: A deep-dive on Machine learning for Cybersecurity use cases. In: Gupta, B., Sheng, M. (eds.) Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. CRC Press, USA"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Mohan, V.S., Vinayakumar, R., Soman, K.P., Poornachandran, P.: S.P.O.O.F net: syntactic patterns for identification of ominous online factors. In: 2017 IEEE Symposium Security and Privacy (SP), BioSTAR 2018 (2018)","DOI":"10.1109\/SPW.2018.00041"},{"key":"51_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.jss.2014.10.031","volume":"100","author":"M Alazab","year":"2015","unstructured":"Alazab, M.: Profiling and classifying the behavior of malicious codes. J. Syst. Softw. 100, 91\u2013102 (2015)","journal-title":"J. Syst. Softw."},{"key":"51_CR7","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.future.2014.06.001","volume":"55","author":"S Huda","year":"2016","unstructured":"Huda, S., Abawajy, J., Alazab, M., Abdollalihian, M., Lslam, R., Yearwood, J.: Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55, 376\u2013390 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"51_CR8","unstructured":"Zhang, X., LeCun, Y.: Text Understanding from Scratch CoRR (2015)"},{"key":"51_CR9","unstructured":"https:\/\/github.com\/baderj\/domain_generation_algorithms"},{"key":"51_CR10","unstructured":"http:\/\/osint.bambenekconsulting.com\/feeds\/"},{"key":"51_CR11","unstructured":"https:\/\/data.netlab.360.com\/dga\/"},{"key":"51_CR12","unstructured":"Does Alexa have a list of its top-ranked websites? \n                  https:\/\/support.alexa.com"},{"key":"51_CR13","unstructured":"OpenDNS domain list. \n                  https:\/\/umbrella.cisco.com\/blog"},{"key":"51_CR14","unstructured":"Security in Computing and Communications (SSCC\u201918). \n                  http:\/\/www.acn-conference.org\/sscc2018\/"},{"key":"51_CR15","unstructured":"International Conference in Advances in computing, Communications and Informatics (ICACCI\u201918). \n                  http:\/\/icacci-conference.org\/2018\/"},{"key":"51_CR16","unstructured":"Goodfellow, I., Bengio, Y., Courville, A., Bach, F.: Deep Learning. Adaptive Computation and Machine Learning series. MIT Press, Cambridge (2016)"},{"key":"51_CR17","unstructured":"Hashemi, H.B., Asiaee, A., Kraft, R.: Query Intent Detection using Convolution Neural Network. WSDM QRUMS (2016)"},{"key":"51_CR18","doi-asserted-by":"crossref","unstructured":"Lenc, L., Kral, P.: Deep Neural Networks for Czech Multi-label Document Classification. CoRR (2017)","DOI":"10.26615\/978-954-452-049-6_057"},{"key":"51_CR19","doi-asserted-by":"crossref","unstructured":"Hoang, X.D., Nguyen, Q.:\u00a0Botnet detection based on machine learning techniques using DNS query data. Future Internet MDPI 2018 (2018)","DOI":"10.3390\/fi10050043"},{"key":"51_CR20","doi-asserted-by":"crossref","unstructured":"Venkatraman S., Alazab, M.: Classification of malware using visualisation of similarity matrices. In: Conference Publishing Services, 8 p. (2017)","DOI":"10.1109\/CCC.2017.11"},{"key":"51_CR21","doi-asserted-by":"publisher","unstructured":"Rajalakshmi, R.: Identifying health domain URLs using SVM. In: Third International Symposium on Women in Computing and Informatics (WCI\u20132015), pp. 203\u2013208. ACM (2015). \n                  https:\/\/doi.org\/10.1145\/2791405.2791441","DOI":"10.1145\/2791405.2791441"},{"key":"51_CR22","unstructured":"Rajalakshmi, R., Aravindan, C.: An effective and discriminative feature learning for URL based web page classification. In: International IEEE Conference on Systems, Man and Cybernetics \u2013 SMC 2018 (2018, accepted)"},{"key":"51_CR23","doi-asserted-by":"publisher","unstructured":"Rajalakshmi, R., Aravindan, C.: Web Page Classification using n-gram based URL Features. In: IEEE Proceedings of International Conference on Advanced Computing (ICoAC 2013), pp. 15\u201321 (2013). \n                  https:\/\/doi.org\/10.1109\/icoac.2013.6921920","DOI":"10.1109\/icoac.2013.6921920"},{"key":"51_CR24","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.procs.2017.09.128","volume":"115","author":"R. Rajalakshmi","year":"2017","unstructured":"Rajalakshmi, R., Xavier, S.: Experimental study of feature weighting techniques for URL based web page classification. Procedia Comput. Sci. 115, 218\u2013225 (2017)","journal-title":"Procedia Computer Science"},{"key":"51_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-642-20573-6_55","volume-title":"Information Technology and Mobile Communication","author":"R Rajalakshmi","year":"2011","unstructured":"Rajalakshmi, R., Aravindan, C.: Naive Bayes approach for website classification. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 323\u2013326. Springer, Heidelberg (2011). \n                  https:\/\/doi.org\/10.1007\/978-3-642-20573-6_55"},{"issue":"1","key":"51_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1111\/coin.12158","volume":"34","author":"R. Rajalakshmi","year":"2018","unstructured":"Rajalakshmi, R., Aravindan, C.: Naive Bayes Approach for URL Classification with Supervised Feature Selection and Rejection Framework, Computational Intelligence, Wiley (2018). \n                  https:\/\/doi.org\/10.1111\/coin.12158","journal-title":"Computational Intelligence"},{"key":"51_CR27","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/978-981-10-8055-5_64","volume-title":"Computational Intelligence in Data Mining","author":"S Sivakumar","year":"2019","unstructured":"Sivakumar, S., Rajalakshmi, R.: Comparative evaluation of various feature weighting methods on movie reviews. In: Behera, H.S., Nayak, J., Naik, B., Abraham, A. (eds.) Computational Intelligence in Data Mining. AISC, vol. 711, pp. 721\u2013730. Springer, Singapore (2019). \n                  https:\/\/doi.org\/10.1007\/978-981-10-8055-5_64"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:53:01Z","timestamp":1558396381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_51","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}