{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:13:12Z","timestamp":1773713592642,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472456"],"award-info":[{"award-number":["62472456"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Key Project of PCL","award":["PCL2024A05"],"award-info":[{"award-number":["PCL2024A05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3630625","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T18:13:24Z","timestamp":1762539204000},"page":"2852-2868","source":"Crossref","is-referenced-by-count":0,"title":["Graph-Based Malicious Domain Name Detection: How to Use the Heuristic Relations"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8264-033X","authenticated-orcid":false,"given":"Yabo","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1474-4324","authenticated-orcid":false,"given":"Weilong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9937-5774","authenticated-orcid":false,"given":"Ruizhi","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1884-5340","authenticated-orcid":false,"given":"Jiakun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2087-2853","authenticated-orcid":false,"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3579440"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7671","article-title":"The DNS-Based authentication of named entities (DANE) protocol: Updates and operational guidance","author":"Dukhovni","year":"2015"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc7208","article-title":"Sender policy framework (SPF) for authorizing use of domains in email, version 1","author":"Kitterman","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23113"},{"key":"ref7","first-page":"379","article-title":"Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blocklists","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Oest","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101614"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3563028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575573"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102287"},{"key":"ref13","first-page":"3505","article-title":"The circle of life: A large-scale study of the IoT malware lifecycle","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Alrawi","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108322"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599775"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109725"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484614"},{"key":"ref18","first-page":"1165","article-title":"Fanci: Feature-based automated NXDomain classification and intelligence","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Sch\u00fcppen","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD49262.2021.9437852"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50420-5_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102057"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3401897"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22868-2_46"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12981-1_34"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110462"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897877"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00066"},{"key":"ref29","article-title":"Domain names - Concepts and facilities","year":"1987"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref31","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666659"},{"key":"ref34","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"issue":"20","key":"ref35","first-page":"10","article-title":"Graph attention networks","volume":"1050","author":"Velickovic","year":"2017","journal-title":"Stat"},{"key":"ref36","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258515"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC47392.2019.8958718"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15931-2_42"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176329"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110847"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.241"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24782"},{"key":"ref44","article-title":"Deep graph library: A graph-centric, highly-performant package for graph neural networks","author":"Wang","year":"2019"},{"key":"ref45","article-title":"MBForbes\/py-FactorGraph: Factor graphs and loopy belief propagation implemented in python","author":"Forbes"},{"key":"ref46","article-title":"Urlhaus","year":"2023"},{"key":"ref47","article-title":"Phishtank","author":"Talos"},{"key":"ref48","article-title":"Stevenblack\/hosts: Consolidating and extending hosts files from several well-curated sources. optionally pick extensions for porn, social media, and other categories","author":"Black","year":"2023"},{"key":"ref49","article-title":"A research-oriented top sites ranking hardened against manipulation","author":"Toplist","year":"2023"},{"key":"ref50","article-title":"Commercial malicious website blocklist services from malwareurl.com","year":"2023"},{"key":"ref51","article-title":"Virustotal","year":"2023"},{"key":"ref52","article-title":"Secrank","year":"2023"},{"key":"ref53","article-title":"Domain names - Implementation and specification","year":"1987"},{"key":"ref54","article-title":"Internet corporation for assigned names and numbers (ICANN)"},{"key":"ref55","article-title":"Industry leading ip geolocation and online fraud prevention - maxmind","year":"2023"},{"key":"ref56","article-title":"Geolite2 free geolocation data","year":"2023"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11235613.pdf?arnumber=11235613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:16:07Z","timestamp":1773710167000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11235613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":54,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3630625","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}