{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:45:23Z","timestamp":1757540723267,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_53","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"678-686","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Domain Name Detection and Classification Using Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"B.","family":"Bharathi","sequence":"first","affiliation":[]},{"given":"J.","family":"Bhuvana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"unstructured":"https:\/\/github.com\/baderj\/domain generation algorithms","key":"53_CR1"},{"unstructured":"http:\/\/osint.bambenekconsulting.com\/feeds\/","key":"53_CR2"},{"unstructured":"https:\/\/data.netlab.360.com\/dga\/","key":"53_CR3"},{"unstructured":"http:\/\/www.acn-conference.org\/sscc2018\/","key":"53_CR4"},{"unstructured":"http:\/\/icacci-conference.org\/2018\/","key":"53_CR5"},{"unstructured":"https:\/\/github.com\/vinayakumarr\/DMD2018","key":"53_CR6"},{"unstructured":"Does Alexa have a list of its top-ranked websites? \n                  https:\/\/support.alexa.com","key":"53_CR7"},{"unstructured":"OpenDNS domain list. \n                  https:\/\/umbrella.cisco.com\/blog","key":"53_CR8"},{"unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C.: URLnet: Learning a URL representation with deep learning for malicious URL detection. arXiv preprint \n                  arXiv:1802.03162\n                  \n                 (2018)","key":"53_CR9"},{"doi-asserted-by":"crossref","unstructured":"Mohan, V.S., Vinayakumar, R., Soman, K., Poornachandran, P.: SPOOF net: syntactic patterns for identification of ominous online factors. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 258\u2013263. IEEE (2018)","key":"53_CR10","DOI":"10.1109\/SPW.2018.00041"},{"unstructured":"Vinayakumar, R., Soman, K.P.: Applying traditional machine learning and deep learning models to detect and categorize DGA. Big Data Eng. Appl. (2018, under-review)","key":"53_CR11"},{"unstructured":"Sahoo, D., Liu, C., Hoi, S.C.: Malicious URL detection using machine learning: a survey. arXiv preprint \n                  arXiv:1701.07179\n                  \n                 (2017)","key":"53_CR12"},{"key":"53_CR13","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-981-10-8476-8_6","volume-title":"Big Data in Engineering Applications","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Poornachandran, P., Soman, K.P.: Scalable framework for cyber threat situational awareness based on domain name systems data analysis. In: Roy, S.S., Samui, P., Deo, R., Ntalampiras, S. (eds.) Big Data in Engineering Applications. SBD, vol. 44, pp. 113\u2013142. Springer, Singapore (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-10-8476-8_6"},{"issue":"3","key":"53_CR14","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.3233\/JIFS-169431","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P.: Detecting malicious domain names using deep learning approaches at scale. J. Intell. Fuzzy Syst. 34(3), 1355\u20131367 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"3","key":"53_CR15","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3233\/JIFS-169423","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K., Poornachandran, P., Sachin Kumar, S.: Evaluating deep learning approaches to characterize and classify the DGAs at scale. J. Intell. Fuzzy Syst. 34(3), 1265\u20131276 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"unstructured":"Vinayakumar R, Soman KP, P.P.: BigCogNet: big data based cognitive security system for an organization. In: Alazab, M., Tang, M.J. (eds.) Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications (under-review)","key":"53_CR16"},{"unstructured":"Vinayakumar, R, Soman KP, P.P., Menon, P.: A deep-dive on Machine learning for Cybersecurity use cases. In: Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. CRC Press (In Press)","key":"53_CR17"},{"unstructured":"Woodbridge, J., Anderson, H.S., Ahuja, A., Grant, D.: Predicting domain generation algorithms with long short-term memory networks. arXiv preprint \n                  arXiv:1611.00791\n                  \n                 (2016)","key":"53_CR18"},{"doi-asserted-by":"crossref","unstructured":"Yu, B., Pan, J., Hu, J., Nascimento, A., De Cock, M.: Character level based detection of DGA domain names. In: ICLR (2018). To appear","key":"53_CR19","DOI":"10.1109\/IJCNN.2018.8489147"},{"issue":"6","key":"53_CR20","first-page":"67","volume":"6","author":"F Zeng","year":"2017","unstructured":"Zeng, F., Chang, S., Wan, X.: Classification for DGA-based malicious domain names with deep learning architectures. Int. J. Intell. Inf. Syst. 6(6), 67 (2017)","journal-title":"Int. J. Intell. Inf. Syst."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:52:49Z","timestamp":1558396369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}