{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:32:59Z","timestamp":1730266379908,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207527","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses"],"prefix":"10.1109","author":[{"given":"Chen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yongzheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yipeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Bidirectional lstm-crf models for sequence tagging","year":"2015","author":"huang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897877"},{"key":"ref12","first-page":"4680","article-title":"DNS graph mining for malicious domain detection","author":"tran","year":"2018","journal-title":"Proceedings of 2017 IEEE International Conference on Big Data BigData 2017"},{"key":"ref13","first-page":"1","article-title":"Exposure: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"NDSS"},{"key":"ref14","first-page":"1","article-title":"Detecting malware domains at the upper DNS hierarchy","volume":"11","author":"antonakakis","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3203422.3203423"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"ref3","first-page":"273","article-title":"Building a dynamic reputation system for DNS","author":"antonakakis","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref6","first-page":"1165","article-title":"Fanci: Feature-based automated NXDomain classification and intelligence","author":"sch\u00fcppen","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.35"},{"key":"ref8","article-title":"Enriching word vectors with subword information","author":"bojanowski","year":"2016","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"ref2","first-page":"1","article-title":"Khaos: An adversarial neural network DGA with high anti-detection ability","author":"yun","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12981-1_34"},{"key":"ref9","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"Computer Science"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207527.pdf?arnumber=9207527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:05Z","timestamp":1656453485000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207527","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}