{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T18:10:12Z","timestamp":1756491012609,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3639631.3639642","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T06:08:33Z","timestamp":1708063713000},"page":"57-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-source information comprehensive malicious domain name detection based on convolutional neural network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5415-0636","authenticated-orcid":false,"given":"Pei-Yuan","family":"Xie","sequence":"first","affiliation":[{"name":"Hunan Electric Power Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5810-8933","authenticated-orcid":false,"given":"Jin-Bo","family":"Wu","sequence":"additional","affiliation":[{"name":"Hunan Electric Power Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0440-7866","authenticated-orcid":false,"given":"Fan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Hunan Electric Power Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8647-1788","authenticated-orcid":false,"given":"Biao","family":"Xiao","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Computer Network Information Center, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,16]]},"reference":[{"volume-title":"49 times China Internet network development state statistic report [EB\/OL]","author":"China Internet Network Information Center","key":"e_1_3_2_1_1_1","unstructured":"China Internet Network Information Center. 49 times China Internet network development state statistic report [EB\/OL]. http:\/\/www.cnnic.cn\/gywm\/xwzx\/rdxw\/20172017_7086\/202202\/t20220225_71724.htm, 2022-02-25."},{"volume-title":"The 13th Internet Security Threat Report [EB\/OL]. [2018-04-01]. http: \/ \/www. cert. org. cn \/publish \/main \/ 44\/2018\/20180404150414268888501\/20180404150414268888501_201html","author":"Network Security Information","key":"e_1_3_2_1_2_1","unstructured":"Network Security Information and trends weekly report. The 13th Internet Security Threat Report [EB\/OL]. [2018-04-01]. http: \/ \/www. cert. org. cn \/publish \/main \/ 44\/2018\/20180404150414268888501\/20180404150414268888501_201html."},{"key":"e_1_3_2_1_3_1","unstructured":"Guangxi YU Yan ZHANG Huajun CUI Xinghua YANG Yang LI Chang LIU. Design and Implementation of A DGA Domain Name Detection System by Machine Learning[J].Journal of Cyber Security 2020 5(3):35-47."},{"issue":"12","key":"e_1_3_2_1_4_1","first-page":"3771","article-title":"System to discover phishing attacks actively based on DNS[J]","volume":"30","author":"Bo Hong","year":"2013","unstructured":"Bo Hong, Guanggang Geng, Liming Wang, Wei Wang, Wei Mao. System to discover phishing attacks actively based on DNS[J]. Computer Application Research, 2013,30(12):3771-3774.","journal-title":"Computer Application Research"},{"key":"e_1_3_2_1_5_1","volume-title":"Research and implementation of malicious domain name detection technology based on big Data analysis [D]","author":"Congxian Yin","year":"2018","unstructured":"Congxian Yin. Research and implementation of malicious domain name detection technology based on big Data analysis [D]. Beijing: Beijing University of Posts and Telecommunications,2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940554"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"396","article-title":"Detection of Fast-Flux Domains Based on Passive DNS Analysis[J]","volume":"52","author":"Changling ZHOU","year":"2016","unstructured":"Changling ZHOU, Kai CHEN, Xuxiao GONG, Ping CHEN, Hao MA. Detection of Fast-Flux Domains Based on Passive DNS Analysis[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2016, 52(3): 396-402.","journal-title":"Acta Scientiarum Naturalium Universitatis Pekinensis"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2021.107342.PMID:"},{"key":"e_1_3_2_1_9_1","volume-title":"Malicious service detection and threat assessment based on DNS activities[D]","author":"Weiwei Zhang","year":"2017","unstructured":"Weiwei Zhang. Malicious service detection and threat assessment based on DNS activities[D]. Southeast University, 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.27440\/d.cnki.gysdu.2021.001541.Prokop"},{"issue":"3","key":"e_1_3_2_1_11_1","first-page":"616","article-title":"Survey on Graph Representation Learning","volume":"44","author":"Ya LIU","year":"2023","unstructured":"Ya LIU, Mingjie LIN, Bo QU. Survey on Graph Representation Learning in Cybersecurity Domain. Journal of Chinese Computer Systems. 2023, 44(3): 616-628.","journal-title":"Journal of Chinese Computer Systems"},{"key":"e_1_3_2_1_12_1","volume-title":"Detection Method of Malicious Domain by DNS Graph Mining Based on Improved BP Algorithm [J]","author":"Xiao Ma","year":"2021","unstructured":"Xiao Ma; Manchun Cai; Tianliang Lu;. Detection Method of Malicious Domain by DNS Graph Mining Based on Improved BP Algorithm [J]. Journal of People's Public Security University of China (Natural Science Edition), 2021,04:68-73."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.27061\/d.cnki.ghgdu.2019.004162"},{"issue":"12","key":"e_1_3_2_1_14_1","first-page":"29","article-title":"DGA malicious domain name detection method based on fusion of CNN and GRU [J]","volume":"2022","author":"Zhenwei Sheng","unstructured":"Zhenwei Sheng, Guotian Xu. DGA malicious domain name detection method based on fusion of CNN and GRU [J]. Network Security Technology & Application, 2022(12):29-32.","journal-title":"Network Security Technology & Application"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.27753\/d.cnki.gcqgx.2022.000270"},{"key":"e_1_3_2_1_16_1","volume-title":"Reading the tea leaves: a comparative analysis of threat intelligence[C]\/\/ USENIX Security Symposium","author":"Li V","year":"2019","unstructured":"Li V , Dunn M , Pearce P , Reading the tea leaves: a comparative analysis of threat intelligence[C]\/\/ USENIX Security Symposium. USENIX Association, 2019."},{"key":"e_1_3_2_1_17_1","volume-title":"Attention mechanisms in computer vision: A survey[J]. Computational visual media","author":"Guo M H","year":"2022","unstructured":"Guo M H, Xu T X, Liu J J, Attention mechanisms in computer vision: A survey[J]. Computational visual media, 2022, 8(3): 331-368."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Luo J H Wu J. Neural network pruning with residual-connections and limited-data[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020: 1458-1467.","DOI":"10.1109\/CVPR42600.2020.00153"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.27029\/d.cnki.ggdgu.2022.001500"},{"issue":"01","key":"e_1_3_2_1_20_1","first-page":"168","article-title":"Detection Method of Malicious Domain Name based on Knowledge Map [J]","volume":"53","author":"Yi Zhang","year":"2020","unstructured":"Yi Zhang, Futai Zou. Detection Method of Malicious Domain Name based on Knowledge Map [J]. Communication Technology, 2020,53(01):168-173.","journal-title":"Communication Technology"},{"issue":"02","key":"e_1_3_2_1_21_1","first-page":"129","article-title":"An approach for detecting malicious domain names generated by dictionary-based DGA [J]","volume":"8","author":"Yifan Xi","year":"2022","unstructured":"Yifan Xi, Yang Wang, Yu Zhang. An approach for detecting malicious domain names generated by dictionary-based DGA [J]. Information Security Research, 2022, 8(02): 129-134.","journal-title":"Information Security Research"}],"event":{"name":"ACAI 2023: 2023 6th International Conference on Algorithms, Computing and Artificial Intelligence","acronym":"ACAI 2023","location":"Sanya China"},"container-title":["2023 6th International Conference on Algorithms Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639631.3639642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639631.3639642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:57Z","timestamp":1756489197000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639631.3639642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":21,"alternative-id":["10.1145\/3639631.3639642","10.1145\/3639631"],"URL":"https:\/\/doi.org\/10.1145\/3639631.3639642","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-02-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}