h1

h2

h3

h4

h5
h6
000959958 001__ 959958
000959958 005__ 20240205150046.0
000959958 0247_ $$2ISBN$$a978-1-4503-9829-9
000959958 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85161406377
000959958 0247_ $$2WOS$$aWOS:001124185500018
000959958 0247_ $$2datacite_doi$$a10.18154/RWTH-2023-05957
000959958 0247_ $$2doi$$a10.1145/3590777.3590795
000959958 037__ $$aRWTH-2023-05957
000959958 041__ $$aEnglish
000959958 1001_ $$0P:(DE-82)IDM05760$$aNitz, Lasse Martin$$b0$$eCorresponding author$$urwth
000959958 1112_ $$aEuropean Interdisciplinary Cybersecurity Conference$$cStavanger$$d2023-06-14 - 2023-06-15$$gEICC 2023$$wNorway
000959958 245__ $$aDGA Detection Using Similarity-Preserving Bloom Encodings$$honline
000959958 260__ $$aNew York,NY,United States$$bAssociation for Computing Machinery$$c2023
000959958 29510 $$aProceedings of the 2023 European Interdisciplinary Cybersecurity Conference / Edited by Aleksandra Mileva, Steffen Wendzel, Virginia Franqueira
000959958 300__ $$a116-120
000959958 3367_ $$033$$2EndNote$$aConference Paper
000959958 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book
000959958 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib
000959958 3367_ $$2BibTeX$$aINPROCEEDINGS
000959958 3367_ $$2DRIVER$$aconferenceObject
000959958 3367_ $$2DataCite$$aOutput Types/Conference Paper
000959958 3367_ $$2ORCID$$aCONFERENCE_PAPER
000959958 500__ $$aWeitere Reihe: ACM digital library
000959958 536__ $$0G:(EU-Grant)833418$$aSAPPAN - Sharing and Automation for Privacy Preserving Attack Neutralization (833418)$$c833418$$fH2020-SU-ICT-2018$$x0
000959958 536__ $$0G:(EU-Grant)101020560$$aCyberSEAS - CyberSEAS: Cyber Securing Energy dAta Services (101020560)$$c101020560$$fH2020-SU-DS-2020$$x1
000959958 588__ $$aDataset connected to CrossRef Conference
000959958 591__ $$aGermany
000959958 653_7 $$aBloom encoding
000959958 653_7 $$aDGA detection
000959958 653_7 $$acybersecurity
000959958 653_7 $$amachine learning
000959958 653_7 $$aprivacy
000959958 653_7 $$aprivacy-preserving data publishing
000959958 653_7 $$asanitization
000959958 7001_ $$00000-0002-8641-7207$$aMandal, Avikarsha$$b1$$eCorresponding author
000959958 8564_ $$uhttps://publications.rwth-aachen.de/record/959958/files/959958.pdf$$yOpenAccess
000959958 909CO $$ooai:publications.rwth-aachen.de:959958$$popenaire$$popen_access$$pec_fundedresources$$pdriver$$pdnbdelivery$$pVDB
000959958 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05760$$aRWTH Aachen$$b0$$kRWTH
000959958 9141_ $$y2023
000959958 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000959958 915__ $$0LIC:(DE-HGF)CCBY4$$2HGFVOC$$aCreative Commons Attribution CC BY 4.0
000959958 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000959958 9201_ $$0I:(DE-82)124510_20160614$$k124510$$lLehrstuhl für Informatik 5 (Informationssysteme und Datenbanken)$$x0
000959958 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000959958 961__ $$c2023-06-19T15:57:48.510922$$x2023-06-19T14:59:28.503564$$z2023-06-20
000959958 9801_ $$aFullTexts
000959958 980__ $$aI:(DE-82)120000_20140620
000959958 980__ $$aI:(DE-82)124510_20160614
000959958 980__ $$aUNRESTRICTED
000959958 980__ $$aVDB
000959958 980__ $$acontb
000959958 980__ $$acontrib