{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:22:21Z","timestamp":1761402141310,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/iscc50000.2020.9219664","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T17:03:51Z","timestamp":1602522231000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Domain-Embeddings Based DGA Detection with Incremental Training Method"],"prefix":"10.1109","author":[{"given":"Xin","family":"Fang","sequence":"first","affiliation":[]},{"given":"Xiaoqing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinran","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622066"},{"key":"ref11","first-page":"12","article-title":"Learning distributed representations of concepts","author":"hinton","year":"1986","journal-title":"Proceedings of the Eighth Annual Conference of the Cognitive Science Society"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2017.8226415"},{"key":"ref13","article-title":"Efficient estimation of word representations in vector space","volume":"abs 1301 3781","author":"mikolov","year":"2013","journal-title":"CoRR"},{"key":"ref14","article-title":"Distributed representations of words and phrases and their compositionality","volume":"abs 1310 4546","author":"mikolov","year":"2013","journal-title":"CoRR"},{"article-title":"Dns2vec: Exploring internet domain names through deep learning","year":"2019","author":"arora","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2018.8367683"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1037"},{"key":"ref18","article-title":"Streaming word embeddings with the space-saving algorithm","volume":"abs 1704 7463","author":"may","year":"2017","journal-title":"CoRR"},{"year":"2019","key":"ref19","article-title":"Country code top-level domain"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"ref3","first-page":"295","author":"pereira","year":"2018","journal-title":"Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic 21st International Symposium RAID 2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2991\/mmsa-18.2018.58"},{"key":"ref5","first-page":"1165","article-title":"&#x00A8; {FANCI}: Feature-based automated nxdomain classification and intelligence","author":"schuppen","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref8","article-title":"Automatic detection of malware-generated domains with recurrent neural models","volume":"abs 1709 7102","author":"lison","year":"2017","journal-title":"CoRR"},{"key":"ref7","first-page":"464","author":"tong","year":"2019","journal-title":"D3N DGA Detection with Deep-Learning Through NXDomain"},{"key":"ref2","first-page":"263","article-title":"A comprehensive measurement study of domain generating malware","author":"plohmann","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref1","first-page":"491","article-title":"From throw-away traffic to bots: Detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)"},{"key":"ref9","article-title":"A lstm based framework for handling multiclass imbalance in dga botnet detection","volume":"275","author":"tran","year":"2017","journal-title":"Neurocomputing"},{"key":"ref20","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"Journal of Machine Learning Research"},{"year":"2015","key":"ref22","article-title":"Passive dns"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"ref24","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"article-title":"Dgarchive","year":"0","author":"fkie","key":"ref23"}],"event":{"name":"2020 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2020,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9213178\/9219543\/09219664.pdf?arnumber=9219664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:24Z","timestamp":1656438864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscc50000.2020.9219664","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}