{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:02:36Z","timestamp":1754161356571,"version":"3.41.2"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/dsc50466.2020.00016","type":"proceedings-article","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T16:24:21Z","timestamp":1598027061000},"page":"53-60","source":"Crossref","is-referenced-by-count":2,"title":["Which DGA Family does A Malicious Domain Name Belong To"],"prefix":"10.1109","author":[{"given":"Yunyi","family":"Zhang","sequence":"first","affiliation":[{"name":"Yat-sen University,School of Data and Computer Science Sun,Guangzhou,China"}]},{"given":"Yuelong","family":"Wu","sequence":"additional","affiliation":[{"name":"Yat-sen University,School of Data and Computer Science Sun,Guangzhou,China"}]},{"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[{"name":"Yat-sen University,School of Data and Computer Science Sun,Guangzhou,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"5","article-title":"Classification for DGA-based malicious domain names with deep learning architectures","author":"feng","year":"2017","journal-title":"2017 Second International Conference on Applied Mathematics and information technology"},{"key":"ref11","first-page":"1165","article-title":"{FANCI}: Feature-based Automated NXDomain Classification and Intelligence","author":"sch\u00fcppen","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489147"},{"key":"ref13","first-page":"640","article-title":"Algorithmically generated domain detection and malware family classification","author":"choudhary","year":"2018","journal-title":"International Symposium on Security in Computing and Communication"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297467"},{"journal-title":"PITOU The &#x201C;silent&#x201D; resurrection of the notorious Srizbi kernel spambot","year":"0","key":"ref15"},{"journal-title":"DGArchive","year":"0","key":"ref16"},{"journal-title":"360netlab","year":"0","key":"ref17"},{"journal-title":"SuppoBox","year":"0","key":"ref18"},{"journal-title":"Murofet","year":"0","key":"ref19"},{"key":"ref4","first-page":"263","article-title":"A comprehensive measurement study of domain generating malware","author":"plohmann","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref3","article-title":"Automatic extraction of domain name generation algorithms from current malware","author":"barabosch","year":"2012","journal-title":"Proc Nato Symposium ist-111 on Information Assurance and Cyber Defense"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"ref8","article-title":"Predicting domain generation algorithms with long short-term memory networks","author":"woodbridge","year":"2016","journal-title":"arXiv preprint arXiv 1611 00791"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.001"},{"key":"ref2","first-page":"446","article-title":"Winning with DNS failures: Strategies for faster botnet detection","author":"yadav","year":"2011","journal-title":"International Conference on Security and Privacy in Communication Systems"},{"key":"ref9","article-title":"Automatic detection of malware-generated domains with recurrent neural models","author":"lison","year":"2017","journal-title":"arXiv preprint arXiv 1709 05206"},{"key":"ref1","first-page":"491","article-title":"From throw-away traffic to bots: detecting the rise of DGA-based malware","author":"antonakakis","year":"0","journal-title":"Presented as part of the 21st USENIX Security Symposium ( USENIX Security 12)"},{"journal-title":"Ramnit Evolution From Worm to Financial Malware","year":"0","key":"ref20"},{"journal-title":"Threat Spotlight GozNym","year":"0","key":"ref22"},{"journal-title":"NECURS The Malware That Breaks Your Security","year":"0","key":"ref21"},{"key":"ref24","first-page":"472","author":"yang","year":"2018","journal-title":"A Novel Detection Method for Word-Based DGA[J]"},{"key":"ref23","first-page":"410","article-title":"V-measure: A conditional entropy-based external cluster evaluation measure","author":"rosenberg","year":"2007","journal-title":"Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL)"},{"key":"ref25","first-page":"105400","volume":"30","author":"zago","year":"2020","journal-title":"Gregorio Mart&#x00ED;nez P&#x00E9;rez UMUDGA A dataset for profiling algorithmically generated domain names in botnet detection Data in Brief"}],"event":{"name":"2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)","start":{"date-parts":[[2020,7,27]]},"location":"Hong Kong, China","end":{"date-parts":[[2020,7,30]]}},"container-title":["2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9169739\/9172417\/09172851.pdf?arnumber=9172851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:46:45Z","timestamp":1753732005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9172851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dsc50466.2020.00016","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}