{"id":"https://openalex.org/W4399146983","doi":"https://doi.org/10.1145/3659211.3659240","title":"The research on a rapid verification method for malicious domain names","display_name":"The research on a rapid verification method for malicious domain names","publication_year":2023,"publication_date":"2023-12-08","ids":{"openalex":"https://openalex.org/W4399146983","doi":"https://doi.org/10.1145/3659211.3659240"},"language":"en","primary_location":{"id":"doi:10.1145/3659211.3659240","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3659211.3659240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057292480","display_name":"Lijun Wang","orcid":"https://orcid.org/0009-0001-4271-8737"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lijun Wang","raw_affiliation_strings":["China Internet Network Information Center (CNNIC), China"],"affiliations":[{"raw_affiliation_string":"China Internet Network Information Center (CNNIC), China","institution_ids":["https://openalex.org/I4210100200"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007388071","display_name":"Qiuming Shang","orcid":"https://orcid.org/0009-0002-8632-9570"},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuming Shang","raw_affiliation_strings":["China Internet Network Information Center (CNNIC), China"],"affiliations":[{"raw_affiliation_string":"China Internet Network Information Center (CNNIC), China","institution_ids":["https://openalex.org/I4210100200"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057292480"],"corresponding_institution_ids":["https://openalex.org/I4210100200"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39011259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7477819919586182},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5713212490081787},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4924667775630951},{"id":"https://openalex.org/keywords/domain-analysis","display_name":"Domain analysis","score":0.4496850371360779},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4238858222961426},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3697627782821655},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09565255045890808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7477819919586182},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5713212490081787},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4924667775630951},{"id":"https://openalex.org/C15708719","wikidata":"https://www.wikidata.org/wiki/Q2271801","display_name":"Domain analysis","level":5,"score":0.4496850371360779},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4238858222961426},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3697627782821655},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09565255045890808},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3659211.3659240","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3659211.3659240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W639708223","https://openalex.org/W4247151238","https://openalex.org/W4293072865"],"related_works":["https://openalex.org/W2102997561","https://openalex.org/W2023019272","https://openalex.org/W2354476589","https://openalex.org/W4246180183","https://openalex.org/W2080403030","https://openalex.org/W2170664339","https://openalex.org/W2497282986","https://openalex.org/W2126137741","https://openalex.org/W2349037640","https://openalex.org/W1556873813"],"abstract_inverted_index":{"The":[0,48,114,176,256],"escalation":[1],"in":[2,20,69,271],"the":[3,66,151,202,215,221,231,276,292,308],"scale":[4],"of":[5,82,227,236,247,263,278,286,294,297,313],"online":[6],"black":[7,44,103,264],"industries,":[8],"including":[9,181],"pornography,":[10],"gambling,":[11],"and":[12,22,40,56,88,104,124,134,187,196,224,234,260,265,284,306,311],"fraud,":[13],"has":[14],"simultaneously":[15],"led":[16],"to":[17,50,65,73,91,127,189,239],"increased":[18],"challenges":[19],"monitoring":[21],"governance.":[23],"These":[24],"industries":[25],"are":[26],"intricately":[27],"linked":[28],"with":[29],"network":[30,74,140,248],"gray":[31,75,105,266],"production":[32,45,76,106,164,241,250,267],"domain":[33,46,77,107,111,131,141,152,165,170,199,216,242,252,268,273,299,315],"names,":[34,78,142,243,300],"which":[35],"facilitate":[36],"access,":[37],"intermediate":[38],"redirection,":[39],"promotion":[41],"services":[42],"for":[43,102,138,150,162,194,214],"names.":[47,316],"access":[49],"these":[51,83],"domains":[52,84],"is":[53,211,254],"highly":[54],"secretive":[55],"cannot":[57],"be":[58],"replicated":[59],"through":[60],"standard":[61],"web":[62],"browsing.":[63],"Due":[64],"complexities":[67],"inherent":[68],"gathering":[70],"evidence":[71],"related":[72,238],"a":[79,98,129,146,158,169,191,206,244],"considerable":[80],"portion":[81],"evade":[85],"effective":[86],"oversight":[87],"regulation":[89],"owing":[90],"inadequate":[92],"evidentiary":[93],"chains.":[94],"This":[95,155,289],"paper":[96],"proposes":[97],"rapid":[99,159],"verification":[100,160],"method":[101,115,161],"names":[108,166,200,253],"based":[109],"on":[110],"name":[112,132,153,171,217,269],"pools.":[113],"utilizes":[116,168],"technologies":[117],"such":[118],"as":[119,143,145,173],"graph":[120,182],"computing,":[121,183],"image":[122,184],"similarity,":[123],"clustering":[125],"analysis":[126,136,148,209,226,262],"construct":[128,190],"comprehensive":[130,192],"scanning":[133,195,223],"dynamic":[135,147,208,232,258,282],"model":[137,149,193,210],"all":[139,272],"well":[144],"pool.":[154,218],"study":[156],"introduces":[157],"black-gray":[163,240,249],"that":[167],"pool":[172],"its":[174],"foundation.":[175],"approach":[177],"incorporates":[178],"cutting-edge":[179],"technologies,":[180],"similarity":[185],"analysis,":[186],"clustering,":[188],"dynamically":[197],"analyzing":[198],"across":[201],"entire":[203],"network.":[204],"Additionally,":[205],"dedicated":[207],"created":[212],"specifically":[213],"It":[219],"facilitates":[220,291],"swift":[222],"forensic":[225],"website":[228],"content.":[229],"Through":[230],"tracking":[233,259],"classification":[235],"indicators":[237,296],"real-time":[245],"compilation":[246],"application":[251],"generated.":[255],"continuous":[257],"in-depth":[261],"clues":[270],"pools":[274],"enable":[275],"acquisition":[277],"their":[279],"behavioral":[280],"characteristics,":[281],"distribution,":[283],"patterns":[285],"technological":[287],"advancement.":[288],"process":[290],"discovery":[293],"additional":[295],"malicious":[298],"thereby":[301],"further":[302],"enhancing":[303],"governance":[304],"efficiency":[305],"achieving":[307],"timely":[309],"identification":[310],"disposal":[312],"undesirable":[314]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
