{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:33:18Z","timestamp":1762507998729,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300167","61872181","61702236","61976120"],"award-info":[{"award-number":["61300167","61872181","61702236","61976120"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20191445"],"award-info":[{"award-number":["BK20191445"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qing Lan Project of Jiangsu Province"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Fuzzy Syst."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/tfuzz.2020.2965872","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T22:58:24Z","timestamp":1579042704000},"page":"742-756","source":"Crossref","is-referenced-by-count":10,"title":["ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1420-2047","authenticated-orcid":false,"given":"Liming","family":"Fang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3473-6943","authenticated-orcid":false,"given":"Xinyu","family":"Yun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4153-5963","authenticated-orcid":false,"given":"Changchun","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3180-7347","authenticated-orcid":false,"given":"Weiping","family":"Ding","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0648-036X","authenticated-orcid":false,"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6461-9684","authenticated-orcid":false,"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-809633-8.20474-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2015.07.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0793-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4018\/IJFSA.2016040103"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/03081079008935107"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2788875"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2722421"},{"key":"ref35","first-page":"409","article-title":"Incremental and decremental support vector machine learning","author":"cauwenberghs","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.5.1155"},{"key":"ref10","first-page":"263","article-title":"A comprehensive measurement study of domain generating malware","author":"plohmann","year":"0","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref40","volume":"422","author":"mclachlan","year":"2005","journal-title":"Analyzing Microarray Gene Expression Data"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref12","first-page":"491","article-title":"From throw-away traffic to bots: Detecting the rise of DGA-based malware","author":"antonakakis","year":"0","journal-title":"Proc 21st USENIX Secur Symp"},{"key":"ref13","article-title":"We know it before you do: Predicting malicious domains","author":"xu","year":"0","journal-title":"Proc Virus Bulletin Conf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"article-title":"Botnet detection using passive DNS","year":"2014","author":"luz","key":"ref15"},{"key":"ref16","first-page":"1165","article-title":"FANCI: Feature-based automated nxdomain classification and intelligence","author":"sch\u00fcppen","year":"0","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2464787"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2717381"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2374214"},{"article-title":"Alext top 500 global sites","year":"0","author":"internet","key":"ref28"},{"article-title":"DDoS attack volume escalates as new methods emerge","year":"0","author":"preimesberger","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1591"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70045-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7975-9_14"},{"article-title":"Thingbots: The future of botnets in the Internet of Things","year":"0","author":"sabanal","key":"ref5"},{"key":"ref8","article-title":"So you want to take over a botnet","author":"dittrich","year":"0","journal-title":"Proc 5th USENIX Workshop Large-Scale Exploits Emergent Threats"},{"article-title":"When bots use social media for command and control","year":"0","author":"zelter","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2012.6487169"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2574915"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140486"},{"key":"ref21","first-page":"192","article-title":"Phoenix: DGA-based botnet tracking and intelligence","author":"schiavoni","year":"0","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.050"},{"article-title":"DGArchive","year":"0","author":"plohmann","key":"ref25"}],"container-title":["IEEE Transactions on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/91\/9391743\/08957003.pdf?arnumber=8957003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:03Z","timestamp":1642003023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8957003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":40,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tfuzz.2020.2965872","relation":{},"ISSN":["1063-6706","1941-0034"],"issn-type":[{"type":"print","value":"1063-6706"},{"type":"electronic","value":"1941-0034"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}