{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:14:19Z","timestamp":1766067259286,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/iotsms52051.2020.9340159","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T07:28:03Z","timestamp":1612337283000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Adopting Machine Learning to Support the Detection of Malicious Domain Names"],"prefix":"10.1109","author":[{"given":"Fernanda","family":"Magalhaes","sequence":"first","affiliation":[]},{"given":"Joao Paulo","family":"Magalhaes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.3233\/JIFS-169431","article-title":"Detecting malicious domain names using deep learning approaches at scale","volume":"34","author":"r","year":"2018","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1056-0_27"},{"article-title":"Malicious Domain Detection Using Machine Learning on Domain Name Features, Host-Based Features and Web-Based Features","year":"2018","author":"palaniappan","key":"ref12"},{"journal-title":"Alexa Top 1 000 000 Sites","year":"0","key":"ref13"},{"journal-title":"Urlhaus - urls used for malware distribution","year":"0","key":"ref14"},{"journal-title":"Dshield - suspicious domain list","year":"0","key":"ref15"},{"journal-title":"Dga collection","year":"0","key":"ref16"},{"journal-title":"Pandas-Dev\/Pandas Pandas","year":"2020","key":"ref17"},{"key":"ref18","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2016.7802040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2019.00080"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9666-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2019.8935681"},{"journal-title":"Tech Rep","article-title":"Vast majority of newly registered domains are malicious","year":"2019","key":"ref2"},{"key":"ref1","article-title":"The domain name industry brief","volume":"17","year":"2020","journal-title":"Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.5"}],"event":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9340169\/9340158\/09340159.pdf?arnumber=9340159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:28Z","timestamp":1656453388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iotsms52051.2020.9340159","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}