{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T15:54:46Z","timestamp":1762012486961,"version":"build-2065373602"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688037","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T02:09:15Z","timestamp":1555034955000},"page":"208-212","source":"Crossref","is-referenced-by-count":6,"title":["AutoEncoded Domains with Mean Activation for DGA Botnet Detection"],"prefix":"10.1109","author":[{"given":"Binay","family":"Dahal","sequence":"first","affiliation":[{"name":"Department of Computer, Science University of Nevada, Las Vegas, Nevada"}]},{"given":"Yoohwan","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer, Science University of Nevada, Las Vegas, Nevada"}]}],"member":"263","reference":[{"key":"ref10","article-title":"From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware","volume":"12","author":"antonakakis","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2015.016"},{"key":"ref13","first-page":"292","article-title":"Identifying DGA-Based Botnets Using Network Anomaly Detection","author":"teodor","year":"2016","journal-title":"Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) 2016 18th International Symposium on IEEE"},{"journal-title":"A deep learning based ddos detection system in software-defined networking (sdn)","year":"2016","author":"niyaz","key":"ref14"},{"journal-title":"Predicting Domain Generation Algorithms with Long Short-Term Memory Networks","year":"2016","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Re-ducing the dimensionality of data with neural networks","volume":"5786","author":"hinton","year":"2006","journal-title":"Science"},{"journal-title":"Top 1 million benign web sites","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"7553","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref4","first-page":"4","article-title":"Behind Phishing: An Examination of Phisher Modi Operandi","volume":"8","author":"mcgrath","year":"2008","journal-title":"LEET"},{"key":"ref3","first-page":"139","article-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","volume":"5","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref6","first-page":"2673","article-title":"Spam filtering using statistical data compression models","author":"bratko","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.165"},{"key":"ref7","first-page":"155","article-title":"Measurement and Classification of Humans and Bots in Internet Chat","author":"gianvecchio","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref2","article-title":"Conficker. C: A technical analysis","author":"fitzgibbon","year":"0","journal-title":"SophosLabs Sophos Inc (2009)"},{"key":"ref1","first-page":"36","article-title":"An analysis of conficker's logic and rendezvous points","author":"porras","year":"2009","journal-title":"SRI Computer Science Laboratory Technical Report"},{"key":"ref9","article-title":"Botdigger: Detecting dga bots in a single network","author":"zhang","year":"2016","journal-title":"Proc IEEE Int Workshop Traffic Monitor Anal"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","start":{"date-parts":[[2019,1,16]]},"location":"London, UK","end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688037.pdf?arnumber=8688037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:18:57Z","timestamp":1755800337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688037","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}