Journal articles on the topic 'Domain Generation Algorithm (DGA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Domain Generation Algorithm (DGA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hwang, Chanwoong, Hyosik Kim, Hooki Lee, and Taejin Lee. "Effective DGA-Domain Detection and Classification with TextCNN and Additional Features." Electronics 9, no. 7 (2020): 1070. http://dx.doi.org/10.3390/electronics9071070.
Full textZhai, You, Liqun Yang, Jian Yang, Longtao He, and Zhoujun Li. "BadDGA: Backdoor Attack on LSTM-Based Domain Generation Algorithm Detector." Electronics 12, no. 3 (2023): 736. http://dx.doi.org/10.3390/electronics12030736.
Full textP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Full textSun, Xinjie, and Zhifang Liu. "Domain generation algorithms detection with feature extraction and Domain Center construction." PLOS ONE 18, no. 1 (2023): e0279866. http://dx.doi.org/10.1371/journal.pone.0279866.
Full textZou, Futai, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, and Kaida Jiang. "Detecting Domain-Flux Malware Using DNS Failure Traffic." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (2018): 151–73. http://dx.doi.org/10.1142/s0218194018400016.
Full textYang, Cheng, Tianliang Lu, Shangyi Yan, Jianling Zhang, and Xingzhan Yu. "N-Trans: Parallel Detection Algorithm for DGA Domain Names." Future Internet 14, no. 7 (2022): 209. http://dx.doi.org/10.3390/fi14070209.
Full textQiao, Yanchen, Bin Zhang, Weizhe Zhang, Arun Kumar Sangaiah, and Hualong Wu. "DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism." Applied Sciences 9, no. 20 (2019): 4205. http://dx.doi.org/10.3390/app9204205.
Full textNamgung, Juhong, Siwoon Son, and Yang-Sae Moon. "Efficient Deep Learning Models for DGA Domain Detection." Security and Communication Networks 2021 (January 18, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887881.
Full textSelvaraj, Sarojini, and Rukmani Panjanathan. "WordDGA: Hybrid Knowledge-Based Word-Level Domain Names Against DGA Classifiers and Adversarial DGAs." Informatics 11, no. 4 (2024): 92. http://dx.doi.org/10.3390/informatics11040092.
Full textAnoop, Reddy Thatipalli, Aravamudu Preetham, Kartheek K., and Dennisan Aju. "Exploring and comparing various machine and deep learning technique algorithms to detect domain generation algorithms of malicious variants." Computer Science and Information Technologies 3, no. 2 (2022): 94–103. https://doi.org/10.11591/csit.v3i2.pp94-103.
Full textThatipalli, Anoop Reddy, Preetham Aravamudu, K. Kartheek, and Aju Dennisan. "Exploring and comparing various machine and deep learning technique algorithms to detect domain generation algorithms of malicious variants." Computer Science and Information Technologies 3, no. 2 (2022): 94–103. http://dx.doi.org/10.11591/csit.v3i2.p94-103.
Full textAnoop Reddy Thatipalli, Preetham Aravamudu, K. Kartheek, and Aju Dennisan. "Exploring and comparing various machine and deep learning technique algorithms to detect domain generation algorithms of malicious variants." Computer Science and Information Technologies 3, no. 2 (2022): 94–103. http://dx.doi.org/10.11591/csit.v3i2.pp94-103.
Full textNiu, Youfeng, Mingxi Guan, Wenhao Yuan, Yilin Chen, Lingyi Chen, and Qiming Yu. "A Bayesian optimization-based LSTM model for DGA domain name identification approach." Journal of Physics: Conference Series 2303, no. 1 (2022): 012015. http://dx.doi.org/10.1088/1742-6596/2303/1/012015.
Full textBerman, Daniel S. "DGA CapsNet: 1D Application of Capsule Networks to DGA Detection." Information 10, no. 5 (2019): 157. http://dx.doi.org/10.3390/info10050157.
Full textMattia, Zago, Gil Pérez Manuel, and Martínez Pérez Gregorio. "Early DGA-Based Botnet Identification: Pushing Detection to the Edges." Cluster Computing 24 (January 2, 2021): 1695–710. https://doi.org/10.1007/s10586-020-03213-z.
Full textXie, Mingtian, Ruifeng He, and Aixing He. "Deep learning DGA malicious domain name detection based on multi-stage feature fusion." Applied and Computational Engineering 64, no. 1 (2024): 1–8. http://dx.doi.org/10.54254/2755-2721/64/20241334.
Full textMaia, Ricardo J. M., Dustin Ray, Sikha Pentyala, et al. "An end-to-end framework for private DGA detection as a service." PLOS ONE 19, no. 8 (2024): e0304476. http://dx.doi.org/10.1371/journal.pone.0304476.
Full textMa, Wei, Xing Wang, Jiguang Wang, and Qianyun Chen. "A Lightweight Hybrid Detection Method for Botnet." International Journal of Circuits, Systems and Signal Processing 15 (August 12, 2021): 960–69. http://dx.doi.org/10.46300/9106.2021.15.103.
Full textSatoh, Akihiro, Yutaka Fukuda, Gen Kitagata, and Yutaka Nakamura. "A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware." Electronics 10, no. 9 (2021): 1039. http://dx.doi.org/10.3390/electronics10091039.
Full textVranken, Harald, and Hassan Alizadeh. "Detection of DGA-Generated Domain Names with TF-IDF." Electronics 11, no. 3 (2022): 414. http://dx.doi.org/10.3390/electronics11030414.
Full textGregório, João Rafael, Adriano Mauro Cansian, and Leandro Alves Neves. "Class Incremental Deep Learning: A Computational Scheme to Avoid Catastrophic Forgetting in Domain Generation Algorithm Multiclass Classification." Applied Sciences 14, no. 16 (2024): 7244. http://dx.doi.org/10.3390/app14167244.
Full textTang, Jisheng, Yiling Guan, Shenghui Zhao, Huibin Wang, and Yinong Chen. "DGA Domain Detection Based on Transformer and Rapid Selective Kernel Network." Electronics 13, no. 24 (2024): 4982. https://doi.org/10.3390/electronics13244982.
Full textFan, Baoyu, Han Ma, Yue Liu, Xiaochen Yuan, and Wei Ke. "KDTM: Multi-Stage Knowledge Distillation Transfer Model for Long-Tailed DGA Detection." Mathematics 12, no. 5 (2024): 626. http://dx.doi.org/10.3390/math12050626.
Full textYang, Luhui, Jiangtao Zhai, Weiwei Liu, et al. "Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis." Symmetry 11, no. 2 (2019): 176. http://dx.doi.org/10.3390/sym11020176.
Full textNie, Yuanping, Shuangshuang Liu, Cheng Qian, et al. "Multimodel Collaboration to Combat Malicious Domain Fluxing." Electronics 12, no. 19 (2023): 4121. http://dx.doi.org/10.3390/electronics12194121.
Full textStampar, Miroslav, and Kresimir Fertalj. "Applied machine learning in recognition of DGA domain names." Computer Science and Information Systems, no. 00 (2021): 46. http://dx.doi.org/10.2298/csis210104046s.
Full textLior, Sidi, Nadler Asaf, and Shabtai Asaf. "MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses." IEEE Access 8 (September 10, 2020): 161580–92. https://doi.org/10.1109/ACCESS.2020.3020964.
Full textZheng, Xingxing, and Xiaona Yin. "A Privacy-Preserved Variational-Autoencoder for DGA Identification in the Education Industry and Distance Learning." Computational Intelligence and Neuroscience 2022 (March 24, 2022): 1–8. http://dx.doi.org/10.1155/2022/7384803.
Full textDuc, Ma Viet, Pham Minh Dang, Tran Thu Phuong, Truong Duc Truong, Vu Hai, and Nguyen Huu Thanh. "Detecting Emerging DGA Malware in Federated Environments via Variational Autoencoder-Based Clustering and Resource-Aware Client Selection." Future Internet 17, no. 7 (2025): 299. https://doi.org/10.3390/fi17070299.
Full textZhuravchak, Danyil, Eduard Kiiko, and Valeriy Dudykevych. "Using EBPF to identify ransomware that use DGA DNS queries." Collection "Information Technology and Security" 11, no. 2 (2023): 166–74. http://dx.doi.org/10.20535/2411-1031.2023.11.2.293760.
Full textLychev, Andrey V. "Synthetic Data Generation for Data Envelopment Analysis." Data 8, no. 10 (2023): 146. http://dx.doi.org/10.3390/data8100146.
Full textNitz, Lasse, and Avikarsha Mandal. "Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage." JUCS - Journal of Universal Computer Science 30, no. 9 (2024): 1224–43. http://dx.doi.org/10.3897/jucs.134762.
Full textNitz, Lasse, and Avikarsha Mandal. "Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage." JUCS - Journal of Universal Computer Science 30, no. (9) (2024): 1224–43. https://doi.org/10.3897/jucs.134762.
Full textLiu, Zhanghui, Yudong Zhang, Yuzhong Chen, Xinwen Fan, and Chen Dong. "Detection of Algorithmically Generated Domain Names Using the Recurrent Convolutional Neural Network with Spatial Pyramid Pooling." Entropy 22, no. 9 (2020): 1058. http://dx.doi.org/10.3390/e22091058.
Full textRanjana B. Nadagoudar. "Algorithmically Generated Domain Names Detection Using Gated Recurrent Unit Deep Learning." Journal of Electrical Systems 20, no. 7s (2024): 469–81. http://dx.doi.org/10.52783/jes.3342.
Full textDanylo Chepel and Serhii Malakhov. "Summary of DNS traffic filtering trends as a component of modern information systems security." Computer Science and Cybersecurity, no. 1 (September 9, 2024): 6–21. http://dx.doi.org/10.26565/2519-2310-2024-1-01.
Full textAbdullahi, S. M., A. Mohammed, R. Y. Ibrahim, and A. S. Shamsuddeen. "Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 27–34. http://dx.doi.org/10.22624/aims/csean-smart2023p4.
Full textKrismanto, Awan Uji, and Herlambang Setiadi. "Intelligent Load Frequency Control considering Large Scale Photovoltaic Generation." International Journal of Smart Grid and Sustainable Energy Technologies 2, no. 1 (2019): 79–87. http://dx.doi.org/10.36040/ijsgset.v2i1.220.
Full textBrafman, R. I., and C. Domshlak. "Structure and Complexity in Planning with Unary Operators." Journal of Artificial Intelligence Research 18 (April 1, 2003): 315–49. http://dx.doi.org/10.1613/jair.1146.
Full textKamarudin, Nur Khairani, Ahmad Firdaus, Mohd Zamri Osman, et al. "The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware." JOIV : International Journal on Informatics Visualization 8, no. 3 (2024): 1398. http://dx.doi.org/10.62527/joiv.8.3.1535.
Full textSrinivas A Vaddadi, Sravanthi Dontu, Abhilash Maroju, Rohith Vallabhaneni,. "The Empirical Analysis on Proposed Ids Models based on Deep Learning Techniques for Privacy Preserving Cyber Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 793–800. http://dx.doi.org/10.17762/ijritcc.v11i9s.9486.
Full textAl-mashhadi, Saif, Mohammed Anbar, Iznan Hasbullah, and Taief Alaa Alamiedy. "Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic." PeerJ Computer Science 7 (August 13, 2021): e640. http://dx.doi.org/10.7717/peerj-cs.640.
Full textRoume, Clément, Samar Ezzina, Hubert Blain, and Didier Delignières. "Biases in the Simulation and Analysis of Fractal Processes." Computational and Mathematical Methods in Medicine 2019 (December 3, 2019): 1–12. http://dx.doi.org/10.1155/2019/4025305.
Full textMohammed, Alaelddin F. Y., Joohyung Lee, and Sangdon Park. "Dynamic Bandwidth Slicing in Passive Optical Networks to Empower Federated Learning." Sensors 24, no. 15 (2024): 5000. http://dx.doi.org/10.3390/s24155000.
Full textFan, Shaohua, Shuyang Zhang, Xiao Wang, and Chuan Shi. "Directed Acyclic Graph Structure Learning from Dynamic Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 6 (2023): 7512–21. http://dx.doi.org/10.1609/aaai.v37i6.25913.
Full textHE, LEI, and GUOWEI MA. "DEVELOPMENT OF 3D NUMERICAL MANIFOLD METHOD." International Journal of Computational Methods 07, no. 01 (2010): 107–29. http://dx.doi.org/10.1142/s0219876210002088.
Full textPark, Seongjoon, and Hwangnam Kim. "DAG-Based Distributed Ledger for Low-Latency Smart Grid Network." Energies 12, no. 18 (2019): 3570. http://dx.doi.org/10.3390/en12183570.
Full textMcClay, Wilbert. "A Magnetoencephalographic/Encephalographic (MEG/EEG) Brain-Computer Interface Driver for Interactive iOS Mobile Videogame Applications Utilizing the Hadoop Ecosystem, MongoDB, and Cassandra NoSQL Databases." Diseases 6, no. 4 (2018): 89. http://dx.doi.org/10.3390/diseases6040089.
Full textGangadhar Puranik, Vishal, Vasudhevan V, Sunil Kumar, Kalpana C, Amutha J, and Ramesh Babu P. "Differential Genetic Algorithm for Auto-Overlay of the Skull and Face and Mandible Articulation." Informing Science: The International Journal of an Emerging Transdiscipline 28 (2025): 011. https://doi.org/10.28945/5431.
Full textMiao, Xiaoyang, Hongda Quan, Xiawei Cheng, et al. "Fault Diagnosis of Oil-Immersed Transformers Based on the Improved Neighborhood Rough Set and Deep Belief Network." Electronics 13, no. 1 (2023): 5. http://dx.doi.org/10.3390/electronics13010005.
Full text