{"id":"https://openalex.org/W4401055958","doi":"https://doi.org/10.1007/s44163-024-00154-z","title":"Transfer learning with ResNet50 for malicious domains classification using image visualization","display_name":"Transfer learning with ResNet50 for malicious domains classification using image visualization","publication_year":2024,"publication_date":"2024-07-26","ids":{"openalex":"https://openalex.org/W4401055958","doi":"https://doi.org/10.1007/s44163-024-00154-z"},"language":"en","primary_location":{"id":"doi:10.1007/s44163-024-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00154-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00154-z.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00154-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049803596","display_name":"Fikirte Ayalke Demmese","orcid":"https://orcid.org/0000-0002-4600-0298"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fikirte Ayalke Demmese","raw_affiliation_strings":["Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106204117","display_name":"Shaghayegh Shajarian","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shaghayegh Shajarian","raw_affiliation_strings":["Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082756758","display_name":"Sajad Khorsandroo","orcid":"https://orcid.org/0000-0003-0649-9247"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajad Khorsandroo","raw_affiliation_strings":["Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering, North Carolina Agricultural and Technical State University, Greensboro, NC, USA","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049803596"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":5.3648,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.96543145,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8418114185333252},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8199062943458557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.785437822341919},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.708839476108551},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6893125772476196},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6269616484642029},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5873459577560425},{"id":"https://openalex.org/keywords/facilitator","display_name":"Facilitator","score":0.5471063256263733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5366231203079224},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4753384590148926},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4747393727302551},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4293532073497772},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3162987530231476},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2631955146789551}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8418114185333252},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8199062943458557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.785437822341919},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.708839476108551},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6893125772476196},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6269616484642029},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5873459577560425},{"id":"https://openalex.org/C2776831358","wikidata":"https://www.wikidata.org/wiki/Q1150166","display_name":"Facilitator","level":2,"score":0.5471063256263733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5366231203079224},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4753384590148926},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4747393727302551},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4293532073497772},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3162987530231476},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2631955146789551},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44163-024-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00154-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00154-z.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3242e32fde2d4ce7a2f3d80d7d779126","is_oa":true,"landing_page_url":"https://doaj.org/article/3242e32fde2d4ce7a2f3d80d7d779126","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Artificial Intelligence, Vol 4, Iss 1, Pp 1-14 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44163-024-00154-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00154-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00154-z.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401055958.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1974770345","https://openalex.org/W1990227054","https://openalex.org/W2010065958","https://openalex.org/W2117539524","https://openalex.org/W2183341477","https://openalex.org/W2801888526","https://openalex.org/W2804240301","https://openalex.org/W2889100747","https://openalex.org/W2894211014","https://openalex.org/W3003925524","https://openalex.org/W3033170608","https://openalex.org/W3041133507","https://openalex.org/W3135939397","https://openalex.org/W4249081347","https://openalex.org/W4290994944","https://openalex.org/W4295122555","https://openalex.org/W4387826905","https://openalex.org/W4389257677"],"related_works":["https://openalex.org/W2036724481","https://openalex.org/W2982596590","https://openalex.org/W2294483539","https://openalex.org/W2251957170","https://openalex.org/W4244650090","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W1979706594","https://openalex.org/W1966145327"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"Internet":[2,43],"has":[3,92,141],"become":[4],"a":[5,14,20,35,128,134,143],"vital":[6],"part":[7],"of":[8,31,41,87,124,148],"our":[9],"daily":[10],"lives,":[11],"serving":[12],"as":[13,67,133],"hub":[15],"for":[16,22,121],"global":[17],"connectivity":[18],"and":[19,25,44,76,103,107,155],"facilitator":[21],"seamless":[23],"communication":[24],"information":[26],"exchange.":[27],"However,":[28],"the":[29,39,42,54,85,114,122],"rise":[30],"malicious":[32,51,125,157],"domains":[33],"presents":[34],"serious":[36],"challenge,":[37],"undermining":[38],"reliability":[40],"posing":[45],"risks":[46],"to":[47,59,63,81,94],"user":[48],"safety.":[49],"These":[50,98],"activities":[52,65],"exploit":[53],"Domain":[55],"Name":[56],"System":[57],"(DNS)":[58],"deceive":[60],"users,":[61],"leading":[62],"harmful":[64],"such":[66,109],"spreading":[68],"drive-by-download":[69],"malware,":[70],"operating":[71],"botnets,":[72],"creating":[73],"phishing":[74],"sites,":[75],"sending":[77],"spam.":[78],"In":[79],"response":[80],"this":[82],"growing":[83],"threat,":[84],"application":[86],"Machine":[88],"Learning":[89],"(ML)":[90],"techniques":[91],"proven":[93],"be":[95],"highly":[96],"effective.":[97],"methods":[99],"excel":[100],"in":[101,117,153],"quickly":[102],"accurately":[104],"detecting,":[105],"classifying,":[106],"analyzing":[108],"threats.":[110],"This":[111],"paper":[112],"explores":[113],"latest":[115],"developments":[116],"using":[118],"transfer":[119],"learning":[120],"classification":[123],"domains,":[126],"with":[127],"focus":[129],"on":[130],"image":[131],"visualization":[132],"key":[135],"methodological":[136],"approach.":[137],"Our":[138],"proposed":[139],"solution":[140],"achieved":[142],"remarkable":[144],"testing":[145],"accuracy":[146],"rate":[147],"98.67%,":[149],"demonstrating":[150],"its":[151],"effectiveness":[152],"detecting":[154],"classifying":[156],"domains.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
