{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T18:15:17Z","timestamp":1769537717899,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,21]]},"DOI":"10.1109\/icaiic54071.2022.9722641","type":"proceedings-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T15:41:38Z","timestamp":1646149298000},"page":"007-010","source":"Crossref","is-referenced-by-count":6,"title":["Countering DNS Vulnerability to Attacks Using Ensemble Learning"],"prefix":"10.1109","author":[{"given":"Love Allen","family":"Chijioke Ahakonye","sequence":"first","affiliation":[{"name":"Kumoh National Institute of Technology,IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Cosmas","family":"Ifeanyi Nwakanma","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Simeon Okechukwu","family":"Ajakwe","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Jae","family":"Min Lee","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Dong-Seong","family":"Kim","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,IT Convergence Engineering,Gumi,South Korea"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11704-019-8208-z","article-title":"A Survey on Ensemble Learning","volume":"14","author":"dong","year":"2020","journal-title":"Frontiers of Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073413"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3076264"},{"key":"ref14","article-title":"Evaluating Artificial Intelligence Mitigation Techniques for Countering Attack on Smart Factory SCADA Network","author":"ahakonye","year":"2021","journal-title":"2021 2nd Korea Artificial Intelligence Conference (KAI)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107871"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101614"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2018.8404704"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/fi10080076"},{"key":"ref2","first-page":"81","article-title":"Secure Domain Name System (DNS) Deployment Guide, author=Chandramouli, Ramaswamy and Rose, Scott","volume":"800","year":"2006","journal-title":"NIST Special Publication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref9","first-page":"1368","article-title":"Intelligent and Real-Time Smart Card Fraud Detection for Optimized Industrial Decision Process","volume":"75","author":"ajakwe","year":"0"}],"event":{"name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","location":"Jeju Island, Korea, Republic of","start":{"date-parts":[[2022,2,21]]},"end":{"date-parts":[[2022,2,24]]}},"container-title":["2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9722611\/9722613\/09722641.pdf?arnumber=9722641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:37:51Z","timestamp":1769492271000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9722641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,21]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icaiic54071.2022.9722641","relation":{},"subject":[],"published":{"date-parts":[[2022,2,21]]}}}