{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:45:51Z","timestamp":1730252751025,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,13]]},"DOI":"10.1109\/icoin50884.2021.9333979","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T10:42:57Z","timestamp":1612348977000},"page":"391-396","source":"Crossref","is-referenced-by-count":2,"title":["Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names"],"prefix":"10.1109","author":[{"given":"Indraneel","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Subham","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Ashutosh","family":"Bhatia","sequence":"additional","affiliation":[]},{"given":"Deepak Kumar","family":"Vishwakarma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1279","article-title":"Detection of algorithmically generated domain names in botnets","author":"vishvakarma","year":"2019","journal-title":"International Conference on Advanced Information Networking and Applications"},{"key":"ref11","article-title":"Analysis of the kraken botnet","volume":"9","author":"royal","year":"2008","journal-title":"Damballa"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920285"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020176"},{"journal-title":"Matsnu botnet dga discovers power of words","year":"2014","author":"mimoso","key":"ref14"},{"key":"ref15","article-title":"End-to-end analysis of a domain generating algorithm malware family","volume":"2013","author":"geffner","year":"2013","journal-title":"Black Hat USA"},{"key":"ref16","article-title":"Maskdga: A black-box evasion technique against dga classifiers and adversarial defenses","author":"sidi","year":"2019","journal-title":"arXiv preprint arXiv 1902 05023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS47819.2019.9118156"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622066"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339258"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref3","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref6","first-page":"467","article-title":"Class-based n-gram models of natural language","volume":"18","author":"brown","year":"1992","journal-title":"Computational Linguistics"},{"journal-title":"Alexa top 1 million domains","year":"2016","key":"ref5"},{"key":"ref8","article-title":"Predicting domain generation algorithms with long short-term memory networks","author":"woodbridge","year":"2016","journal-title":"arXiv preprint arXiv 1611 00791"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"journal-title":"2019 global ddos threat landscape report","year":"2019","author":"avital","key":"ref2"},{"key":"ref9","first-page":"303","article-title":"ALOHA: Auxiliary loss optimization for hypothesis augmentation","author":"rudd","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref1","article-title":"Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic","author":"lallie","year":"2020","journal-title":"arXiv preprint arXiv 2006 10226"},{"key":"ref20","article-title":"Inline detection of dga domains using side information","author":"sivaguru","year":"2020","journal-title":"arXiv preprint arXiv 2003 07516"},{"key":"ref22","first-page":"69","article-title":"Deep convolutional neural networks for sentiment analysis of short texts","author":"dos santos","year":"2014","journal-title":"Proceedings of COLING 2014 the 25th International Conference on Computational Linguistics Technical Papers"},{"key":"ref21","article-title":"Real-time detection of dictionary dga network traffic using deep learning","author":"highnam","year":"2020","journal-title":"arXiv preprint arXiv 2003 12805"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2184552"},{"journal-title":"DGArchive","year":"2018","author":"plohmann","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"}],"event":{"name":"2021 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2021,1,13]]},"location":"Jeju Island, Korea (South)","end":{"date-parts":[[2021,1,16]]}},"container-title":["2021 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9333828\/9333848\/09333979.pdf?arnumber=9333979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:40:10Z","timestamp":1652182810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9333979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icoin50884.2021.9333979","relation":{},"subject":[],"published":{"date-parts":[[2021,1,13]]}}}