iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1587/TRANSINF.2018EDL8211
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:13:19Z","timestamp":1705540399598},"reference-count":16,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2019,7,1]]},"DOI":"10.1587\/transinf.2018edl8211","type":"journal-article","created":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T22:10:59Z","timestamp":1561932659000},"page":"1404-1407","source":"Crossref","is-referenced-by-count":4,"title":["Clustering Malicious DNS Queries for Blacklist-Based Detection"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Akihiro","family":"SATOH","sequence":"first","affiliation":[{"name":"Kyushu Institute of Technology"}]},{"given":"Yutaka","family":"NAKAMURA","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology"}]},{"given":"Daiki","family":"NOBAYASHI","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology"}]},{"given":"Kazuto","family":"SASAI","sequence":"additional","affiliation":[{"name":"Ibaraki University"}]},{"given":"Gen","family":"KITAGATA","sequence":"additional","affiliation":[{"name":"Tohoku University"}]},{"given":"Takeshi","family":"IKENAGA","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] J.A. Lewis, \u201cEconomic impact of cybercrime \u2014 At $600 billion and counting-No slowing down,\u201d https:\/\/www.csis.org\/analysis\/economic-impact-cybercrime, 2018."},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] B. Rahbarinia, R. Perdisci, and M. Antonakakis, \u201cEfficient and accurate behavior-based tracking of malware-control domains in large ISP networks,\u201d ACM Trans. Privacy and Security, vol.19, no.2, pp.4:1-4:31, 2016. 10.1145\/2960409","DOI":"10.1145\/2960409"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N. Kheir, F. Tran, P. Caron, and N. Deschamps, \u201cMentor: Positive DNS reputation to skim-off benign domains in botnet C&C blacklists,\u201d Proc. International Conference on ICT Systems Security and Privacy Protection, pp.1-14, 2014. 10.1007\/978-3-642-55415-5_1","DOI":"10.1007\/978-3-642-55415-5_1"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. K\u00fchrer, C. Rossow, and T. Holz, \u201cPaint it black: Evaluating the effectiveness of malware blacklists,\u201d Proc. International Symposium on Research in Attacks, Intrusions and Defenses, Lecture Notes in Computer Science, vol.8688, pp.1-21, Springer, Cham, 2014. 10.1007\/978-3-319-11379-1_1","DOI":"10.1007\/978-3-319-11379-1_1"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] T.-S. Wang, H.-T. Lin, W.-T. Cheng, and C.-Y. Chen, \u201cDBod: Clustering and detecting DGA-based botnets using DNS traffic analysis,\u201d Computers & Security, vol.64, pp.1-15, 2017. 10.1016\/j.cose.2016.10.001","DOI":"10.1016\/j.cose.2016.10.001"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] A. Berger, A. D'Alconzo, W.N. Gansterer, and A. Pescap\u00e9, \u201cMining agile DNS traffic using graph analysis for cybercrime detection,\u201d Computer Networks, vol.100, pp.28-44, 2016. 10.1016\/j.comnet.2016.02.009","DOI":"10.1016\/j.comnet.2016.02.009"},{"key":"7","unstructured":"[7] Q. Le et al., \u201cDistributed representations of sentences and documents,\u201d Proc. International Conference on Machine Learning, pp.1188-1196, 2014."},{"key":"8","unstructured":"[8] T. Mikolov et al., \u201cDistributed representations of words and phrases and their compositionality,\u201d Advances in Neural Information Processing Systems, pp.3111-3119, 2013."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] L. Scrucca, M. Fop, T.B. Murphy, and A.E. Raftery, \u201cmclust 5: Clustering, classification and density estimation using Gaussian finite mixture models,\u201d The R Journal, vol.8, no.1, pp.289-317, 2016. 10.32614\/rj-2016-021","DOI":"10.32614\/RJ-2016-021"},{"key":"10","unstructured":"[10] DNS-BH, https:\/\/www.malwaredomains.com"},{"key":"11","unstructured":"[11] hpHosts Online, https:\/\/hosts-file.net"},{"key":"12","unstructured":"[12] abuse.ch, https:\/\/abuse.ch"},{"key":"13","unstructured":"[13] Alexa, http:\/\/www.alexa.com"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] H. Ichise, Y. Jin, and K. Iida, \u201cAnalysis of DNS TXT record usage and consideration of botnet communication detection,\u201d IEICE Trans. Commun,, vol.E101-B, no.1, pp.70-79, Jan. 2018. 10.1587\/transcom.2017itp0009","DOI":"10.1587\/transcom.2017ITP0009"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] R. Cuevas, M. Kryczka, R. Gonz\u00e1lez, A. Cuevas, and A. Azcorra, \u201cTorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystem,\u201d Computer Networks, vol.59, pp.77-90, 2014. 10.1016\/j.bjp.2013.12.007","DOI":"10.1016\/j.bjp.2013.12.007"},{"key":"16","unstructured":"[16] A.D. Berns et al., \u201cSearching for malware in BitTorrent,\u201d University of Iowa Computer Science Technical Report, pp.1-10, 2008."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/7\/E102.D_2018EDL8211\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T03:27:12Z","timestamp":1562383632000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/7\/E102.D_2018EDL8211\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edl8211","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}