{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:48Z","timestamp":1750220028778,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3584376.3584519","type":"proceedings-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T22:54:51Z","timestamp":1681944891000},"page":"804-810","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Abnormal Domain Name Generation Method Based on a Character-Level Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1581-3795","authenticated-orcid":false,"given":"Chunbing","family":"Wu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-9402","authenticated-orcid":false,"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558918"},{"key":"e_1_3_2_1_2_1","volume-title":"On the impact of DNS over HTTPS paradigm on cyber systems[C]\/\/2020 3rd International Conference on Information and Computer Technologies (ICICT)","author":"Bumanglag K","year":"2020","unstructured":"Bumanglag K , Kettani H. On the impact of DNS over HTTPS paradigm on cyber systems[C]\/\/2020 3rd International Conference on Information and Computer Technologies (ICICT) . IEEE , 2020 : 494-9. Bumanglag K, Kettani H. On the impact of DNS over HTTPS paradigm on cyber systems[C]\/\/2020 3rd International Conference on Information and Computer Technologies (ICICT). IEEE, 2020: 494-9."},{"key":"e_1_3_2_1_3_1","unstructured":"Plohmann D Yakdan K Klatt M A comprehensive measurement study of domain generating malware[C]\/\/25th USENIX Security Symposium (USENIX Security 16). 2016: 263-278. Plohmann D Yakdan K Klatt M A comprehensive measurement study of domain generating malware[C]\/\/25th USENIX Security Symposium (USENIX Security 16). 2016: 263-278."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749442"},{"volume-title":"Your botnet is my botnet: analysis of a botnet takeover[C]\/\/Proceedings of the 16th ACM conference on Computer and communications security. 2009: 635-647","author":"Stone-Gross B","key":"e_1_3_2_1_5_1","unstructured":"Stone-Gross B , Cova M , Cavallaro L , Your botnet is my botnet: analysis of a botnet takeover[C]\/\/Proceedings of the 16th ACM conference on Computer and communications security. 2009: 635-647 . Stone-Gross B, Cova M, Cavallaro L, Your botnet is my botnet: analysis of a botnet takeover[C]\/\/Proceedings of the 16th ACM conference on Computer and communications security. 2009: 635-647."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.03.001"},{"key":"e_1_3_2_1_7_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Daniel Plohmann","year":"2016","unstructured":"Daniel Plohmann , Khaled Yakdan, Michael Klatt , Johannes Bader, and Elmar Gerhards-Padilla . 2016 . A comprehensive measurement study of domain generating malware . In 25th USENIX Security Symposium (USENIX Security 16) . 263\u2013278. Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, and Elmar Gerhards-Padilla. 2016. A comprehensive measurement study of domain generating malware. In 25th USENIX Security Symposium (USENIX Security 16). 263\u2013278."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2016.011"},{"key":"e_1_3_2_1_9_1","volume-title":"Breaking bad: Detecting malicious domains using word segmentation[J]. arXiv preprint arXiv:1506.04111","author":"Wang W","year":"2015","unstructured":"R Wang W , Shirley K. Breaking bad: Detecting malicious domains using word segmentation[J]. arXiv preprint arXiv:1506.04111 , 2015 . R Wang W, Shirley K. Breaking bad: Detecting malicious domains using word segmentation[J]. arXiv preprint arXiv:1506.04111, 2015."},{"key":"e_1_3_2_1_10_1","first-page":"1061","article-title":"Detecting malicious Fast-Flux domains using feature-based classification techniques[J]","volume":"21","author":"Truong D T","year":"2020","unstructured":"Truong D T , Tran D T , Huynh B . Detecting malicious Fast-Flux domains using feature-based classification techniques[J] . J Internet Technol. , 2020 , 21 : 1061 - 1072 . Truong D T, Tran D T, Huynh B. Detecting malicious Fast-Flux domains using feature-based classification techniques[J]. J Internet Technol., 2020, 21: 1061-72.","journal-title":"J Internet Technol."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102933"},{"key":"e_1_3_2_1_12_1","volume-title":"Character-aware neural language models[C]\/\/Thirtieth AAAI conference on artificial intelligence","author":"Kim Y","year":"2016","unstructured":"Kim Y , Jernite Y , Sontag D , Character-aware neural language models[C]\/\/Thirtieth AAAI conference on artificial intelligence , 2016 . Kim Y, Jernite Y, Sontag D, Character-aware neural language models[C]\/\/Thirtieth AAAI conference on artificial intelligence, 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Inline detection of domain generation algorithms with context-sensitive word embeddings[C]\/\/2018 IEEE International Conference on Big Data (Big Data)","author":"Koh J J","year":"2018","unstructured":"Koh J J , Rhodes B. Inline detection of domain generation algorithms with context-sensitive word embeddings[C]\/\/2018 IEEE International Conference on Big Data (Big Data) . IEEE , 2018 : 2966-71. Koh J J, Rhodes B. Inline detection of domain generation algorithms with context-sensitive word embeddings[C]\/\/2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018: 2966-71."},{"key":"e_1_3_2_1_14_1","volume-title":"URL: http:\/\/karpathy. github. io\/2015\/05\/21\/rnn-effectiveness\/dated","author":"Blog A K","year":"2015","unstructured":"Blog A K . The Unreasonable Effectiveness of Recurrent Neural Networks[J]. URL: http:\/\/karpathy. github. io\/2015\/05\/21\/rnn-effectiveness\/dated May , 2015 , 21: 31. Blog A K.The Unreasonable Effectiveness of Recurrent Neural Networks[J]. URL: http:\/\/karpathy. github. io\/2015\/05\/21\/rnn-effectiveness\/dated May, 2015, 21: 31."},{"key":"e_1_3_2_1_15_1","volume-title":"Attention is all you need[J]. Advances in neural information processing systems","author":"Vaswani A","year":"2017","unstructured":"Vaswani A , Shazeer N , Parmar N , Attention is all you need[J]. Advances in neural information processing systems , 2017 , 30. Vaswani A, Shazeer N, Parmar N, Attention is all you need[J]. Advances in neural information processing systems, 2017, 30."},{"key":"e_1_3_2_1_16_1","volume-title":"Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer[J]. arXiv preprint arXiv:1612.03928","author":"Zagoruyko S","year":"2016","unstructured":"Zagoruyko S , Komodakis N. Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer[J]. arXiv preprint arXiv:1612.03928 , 2016 . Zagoruyko S, Komodakis N. Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer[J]. arXiv preprint arXiv:1612.03928, 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Alexa Internet Inc. Alexa top-ranked websites [EB\/OL]. http: \/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip 2020. Alexa Internet Inc. Alexa top-ranked websites [EB\/OL]. http: \/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip 2020.","DOI":"10.1109\/EHB50910.2020.9280254"},{"key":"e_1_3_2_1_18_1","volume-title":"360 DGA feeds [EB\/OL]. Netlab360. https:\/\/data.netlab.360.com\/dga\/","author":"Netlab 0","year":"2022","unstructured":"Netlab 36 0 , 360 DGA feeds [EB\/OL]. Netlab360. https:\/\/data.netlab.360.com\/dga\/ , 2022 . Netlab360, 360 DGA feeds [EB\/OL]. Netlab360. https:\/\/data.netlab.360.com\/dga\/, 2022."}],"event":{"name":"RICAI 2022: 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","acronym":"RICAI 2022","location":"Dongguan China"},"container-title":["Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584376.3584519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:42Z","timestamp":1750182702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":18,"alternative-id":["10.1145\/3584376.3584519","10.1145\/3584376"],"URL":"https:\/\/doi.org\/10.1145\/3584376.3584519","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}