{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:13:25Z","timestamp":1774127605048,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100007065","name":"NVIDIA Corporation with the donation of the Titan Xp GPU","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fellowship of the Research Foundation Flanders"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3013494","type":"journal-article","created":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T20:23:49Z","timestamp":1596227029000},"page":"141910-141922","source":"Crossref","is-referenced-by-count":27,"title":["Inline Detection of DGA Domains Using Side Information"],"prefix":"10.1109","volume":"8","author":[{"given":"Raaghavi","family":"Sivaguru","sequence":"first","affiliation":[{"name":"School of Engineering and Technology, University of Washington Tacoma, Tacoma, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2929-4164","authenticated-orcid":false,"given":"Jonathan","family":"Peck","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Computer Science and Statistics, Ghent University, Ghent, Belgium"}]},{"given":"Femi","family":"Olumofin","sequence":"additional","affiliation":[{"name":"Infoblox, Santa Clara, CA, USA"}]},{"given":"Anderson","family":"Nascimento","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, University of Washington Tacoma, Tacoma, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7917-0771","authenticated-orcid":false,"given":"Martine","family":"De Cock","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, University of Washington Tacoma, Tacoma, WA, USA"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Automatic detection of malware-generated domains with recurrent neural models","author":"lison","year":"2017","journal-title":"arXiv 1709 07102"},{"key":"ref38","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897877"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868376"},{"key":"ref31","first-page":"1","article-title":"Detecting malware domains at the upper DNS hierarchy","volume":"11","author":"antonakakis","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.12.008"},{"key":"ref37","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3107008"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.12.005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339258"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891588"},{"key":"ref13","first-page":"640","article-title":"Algorithmically generated domain detection and malware family classification","author":"choudhary","year":"2018","journal-title":"Proc Int Symp Secur Comput Commun"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621875"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489147"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258361"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2200\/S00861ED1V01Y201806AIM039"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911522"},{"key":"ref4","first-page":"1165","article-title":"FANCI: Feature-based automated nxdomain classification and intelligence","author":"sch\u00fcppen","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref27","article-title":"Using lexical features for malicious URL detection&#x2014;A machine learning approach","author":"joshi","year":"2019","journal-title":"arXiv 1910 06277"},{"key":"ref3","first-page":"192","article-title":"Phoenix: DGA-based botnet tracking and intelligence","author":"schiavoni","year":"2014","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.96"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2991\/mmsa-18.2018.58"},{"key":"ref5","article-title":"Predicting domain generation algorithms with long short-term memory networks","author":"woodbridge","year":"2016","journal-title":"arXiv 1611 00791"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.11.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622066"},{"key":"ref2","first-page":"491","article-title":"From throw-away traffic to bots: Detecting the rise of DGA-based malware","volume":"12","author":"antonakakis","year":"2012","journal-title":"Proc Usenix Secur Symp"},{"key":"ref9","article-title":"Expose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys","author":"saxe","year":"2017","journal-title":"arXiv 1702 08568"},{"key":"ref1","first-page":"263","article-title":"A comprehensive measurement study of domain generating malware","author":"plohmann","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927075"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297467"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996767"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2668361"},{"key":"ref23","article-title":"MaskDGA: A black-box evasion technique against DGA classifiers and adversarial defenses","author":"sidi","year":"2019","journal-title":"arXiv 1902 08909"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_14"},{"key":"ref25","article-title":"Hardening inline DGA classifiers against adversarial attacks","author":"sivaguru","year":"2019"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09153925.pdf?arnumber=9153925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:10:19Z","timestamp":1662667819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9153925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3013494","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}